When are duplicate objects allowed in object groups?
When are duplicate objects allowed in object groups?
How to handle FTP on the security appliance after this policy is applied?
You are the network security administrator for the company. You create an FTP inspection policy
including the strict option, and it is applied to the outside interface of the corporate adaptive
security appliance. How to handle FTP on the security appliance after this policy is applied?
(Choose three.;)
which one would configure the adaptive security appliance to use an ACS server for console access authenticati
For the following commands, which one would configure the adaptive security appliance to use an
ACS server for console access authentication?
Which set of steps should be taken to obtain this information?
At the headquarter of the company, the adaptive security appliance has recently been logging
more threats and anomalies than usual. Its network security department is unsure of the severity
of these potential threats and anomalies. This department would like to gather information on
threat-related protocols and ports to get a broader view of the overall situation and determine what
action to take. For instance, the administrator of this company would like to know about bursts on
a particular port or protocol or on a set of ports and protocols.
Which set of steps should be taken to obtain this information?
what is the problem with the failover configuration?
Study the exhibit carefully. When the show failover command has returned this output, what is the
problem with the failover configuration?
fw2# show failover
Failover ON
Cable status: Other side not connected
Failover unit Primary
Failover LAN Interface: N/A-Serial-based failover enabled
Unit Poll frequency 15 seconds, holdtime 45 seconds
Interface Poll frequency 15 seconds
Interface Policy 1
Monitored Interfaces 3 of 250 maximum
Last Failover at: 13:21:38 UTC Dec 10 2004
This host: Primary-Active
Active time: 200(sec)
Interface outside (192.168.2.2): Normal (Waiting)
Interface inside (10.0.2.1): Normal (Waiting)
Interface dmz (172.16.2.1): Normal (Waiting) Other host: Secondary-Not detected
Active time: O(sec)
Interface outside (192.168.2.7): Unknown (Waiting)
Interface inside (10.0.2.7): Unknown (Waiting)
Interface dmz (172.16.2.7): Unknown (Waiting)
Stateful Failover Logical Update Statistics Link: Unconfigured
which three items does the Cisco ASDM IPsec VPN Wizard require you to configure?
While setting up a remote access VPN, which three items does the Cisco ASDM IPsec VPN
Wizard require you to configure? (Choose three.)
Why does Telnet and FTP authentication work normally but HTTP authentication does not?
You have configured the security appliance and an AAA server for authentication. Why does
Telnet and FTP authentication work normally but HTTP authentication does not?
Where should you go in Cisco ASDM to accomplish this task?
Cisco ASDM helps you manage network and application security more effectively while improving
operational efficiency. You work as a network administrator for ABC company. And you use the
IPsec VPN Wizard to configure a site-to-site VPN in Cisco ASDM. Now you would like to modify
the crypto ACL to specify different protected traffic. Where should you go in Cisco ASDM to
accomplish this task?
Which three of these commands, used individually, would allow the administrator to place limits on the number
An administrator wants to protect a DMZ web server from SYN flood attacks. Which three of these
commands, used individually, would allow the administrator to place limits on the number of
embryonic connections? (Choose three.)
Which three items are standards to identify a set of Layer 3/4 through traffic?
Which three items are standards to identify a set of Layer 3/4 through traffic? (Choose three.)