How do you ensure that the main interface does not pass untagged traffic when using subinterfaces?
How do you ensure that the main interface does not pass untagged traffic when using
subinterfaces?
which three tasks are mandatory?
For creating and configuring a security context, which three tasks are mandatory? (Choose three.)
Which two types of failover is this adaptive security appliance configured for?
Study the exhibit carefully. Which two types of failover is this adaptive security appliance
configured for? (Choose two.)
asa1# show failover
Failover On
Cable status: N/A-LAN-based failover enabled
Failover unit Primary
Failover LAN Interface: lanfail GigabitEthernetO/2 (up)
Unit Poll frequency 15 seconds, holdtime 45 seconds
Interface Poll frequency 15 seconds
Interface Policy 1
Monitored Interfaces 4 of 250 maximum
Group 1 last failover at: 15:54:49 UTC Sept 17 2006
Group 2 last failover at: 15:55:00 UTC Sept 17 2006
Which two descriptions are correct about configuring passive RIP on the security appliance based on the follow
Which of these identifies basic settings for the security appliance, including a list of contexts?
Which of these identifies basic settings for the security appliance, including a list of contexts?
Which are two mistakes?
Study the exhibit carefully.
The security policy for Corporation allows only the following traffic through the corporate adaptive
security appliance:
-outbound NTP traffic from the inside network to any outside destination
-FTP traffic from the inside network to the FTP server on the DMZ
-outbound HTTP traffic from the inside network to any outside destination
-FTP traffic from the outside 192.168.6.0/24 network to the FTP server on the DMZ
-any HTTP traffic from the outside to the web server on the DMZ
The network administrator configured access rules according to the security policy requirements
but made two mistakes. Which are two mistakes? (Choose two.)
Which command does not allow the administrator to place limits on the number of embryonic connections?
An administrator wants to protect a DMZ web server from SYN flood attacks. Which command
does not allow the administrator to place limits on the number of embryonic connections?
Which option correctly describes the order to upgrade the license (activation key) for your security appliance
Which option correctly describes the order to upgrade the license (activation key) for your security
appliance from Cisco ASDM?
which command would reactivate the primary adaptive security appliance and return it to "active" sta
You are a network administrator for the company. After the primary adaptive security appliance
failed, the secondary adaptive security appliance was automatically activated. You fixed the
problem. Now you would like to restore the primary to “active” status.
When issued on the primary adaptive security appliance, which command would reactivate the
primary adaptive security appliance and return it to “active” status?