Which step is optional when configuring the crypto maps on the Firewalls?
You are creating a site-to-site VPN using IPSec between two PIX Firewalls. Which step is optional
when configuring the crypto maps on the Firewalls?
what is the minimum NAT configuration you can enter?
If you want to have IP addresses of hosts on your DMZ and those of hosts on your inside network
translated when they make connections to hosts on the outside interface of the PIX Firewall, what
is the minimum NAT configuration you can enter?
What change did the administrator make?
Your new network administrator has recently modified your PIX Firewall’s configuration. You are
suddenly experiencing security breaches involving Internet mail. What change did the
administrator make?
which of the above mentioned commands?
The graphic shows a partial configuration. An account manager (AM) at a small site wants to
access the boston_sales.cisco.com server. The account manager knows the name, but not the IP
address of the server. The AM’s PC requests DNS resolution of the inside web server address
from a DNS server on an outside network. To enable the PIX Firewall to perform a DNS A record
translation correctly for the above mentioned application, the DNS key word should be added to
which of the above mentioned commands?
what commands should they enter to force remote PC users to authenticate before allowing them access to a VPN
For added security, the network manager wants PCs on the inside network at the remote office to
authenticate with an ACS server, ACS1, at the central site before allowing these individuals PCs to
access a VPN tunnel. As the network administrator, at which location and what commands should
they enter to force remote PC users to authenticate before allowing them access to a VPN tunnel?
(Choose two.)
What commands should the administrator enter to accomplish this?
Which is possible with the FWSM for the Catalyst 6500 switch?
Which is possible with the FWSM for the Catalyst 6500 switch?
what commands should they enter to force remote PC users to authenticate before allowing them access to a VPN
For added security, the network manager wants PCs on the inside network at the remote office to
authenticate with an ACS server, ACS1, at the central site before allowing these individuals PCs to
access a VPN tunnel. As the network administrator, at which location and what commands should
they enter to force remote PC users to authenticate before allowing them access to a VPN tunnel?
(Choose two.)
What is the purpose of the command ip local pool MYPOOL 10.0.0.20-10.0.0.29?
What is the purpose of the command ip local pool MYPOOL 10.0.0.20-10.0.0.29?
How do you make the ACL work?
You already created an ACL named ACLIN to permit traffic from certain Internet hosts to the web
server on your DMZ. How do you make the ACL work? Choose two.