What username and password establish an SSH connection to your PIX Firewall?
What username and password establish an SSH connection to your PIX Firewall?
which of the following tasks?
An IT professional at the DEF Corporation asked the corporation’s PIX Firewall administrator if a
user on the inside network could access two sites on the Internet and present two different source
IP addresses. When accessing an FTP server, the source IP address is translated to 192.168.0.9.
When accessing a web server, the source address is translated to 192.168.0.21. The PIX Firewall
administrator could accomplish this application by completing which of the following tasks?
what command should be enter to enable remote PIX device authentication?
The XYZ Corporation security manager wants the easy VPN remote office PIX Firewall, PIX1, to
authenticate itself with ACS server, ACS1, at the central site before a VPN tunnel is established.
As the network administrator, at which location and what command should be enter to enable
remote PIX device authentication? (Choose two.)
Why The LAN-based failover you configured does not work?
The LAN-based failover you configured does not work. Why? Choose two reasons.
How many DNS servers can be specified with the dhcpd dns command?
How many DNS servers can be specified with the dhcpd dns command?
What protocol does the PIX MC use to communicate with the PIX Firewall?
What protocol does the PIX MC use to communicate with the PIX Firewall?
Which commands configure the PIX Firewall’s PPPoE client?
Which commands configure the PIX Firewall’s PPPoE client?
Which PIX Firewall feature should you configure to minimize the average search time for access control lists c
You are the network security administrator for an enterprise network with a complex security
policy. Which PIX Firewall feature should you configure to minimize the average search time for
access control lists containing a large number of entries?
which should you do?
If you configure a VPN between a Cisco VPN Client and the PIX Firewall using pre-shared keys
for authentication, which should you do? Choose two.
What can you do?
You are the network security administrator for a large network. You want to require users to
authenticate for connections through the PIX Firewall using services or protocols that do not
support authentication. What can you do?