Which two statements correctly describe the local user database in the security appliance?
Which two statements correctly describe the local user database in the security appliance? (Choose two.)
Which three tasks are needed to achieve this goal?
The security department of the P4S company wants to configure cut-through proxy authentication via RADIUS to require users to authenticate before accessing the corporate DMZ servers. Which three tasks are needed to achieve this goal? (Choose three.)
Which three tasks should be completed in order to achieve the goal of limiting network access for Bob via down
The P4S security department would like to apply specific restrictions to one network user, Bob, because he works from home and accesses the corporate network from the outside interface of the security appliance. P4S decides to control network access for this user by using the downloadable ACL feature of the security appliance. Authentication of inbound traffic is already configured on the security appliance, and Bob already has a user account on the Cisco Secure ACS. Which three tasks should be completed in order to achieve the goal of limiting network access for Bob via downloadable ACLs? (Choose three.)
What is the reason that you want to configure VLANs on a security appliance interface?
What is the reason that you want to configure VLANs on a security appliance interface?
Which three features can the Cisco ASA adaptive security appliance support?
Which three features can the Cisco ASA adaptive security appliance support? (Choose three.)
which three actions are mandatory?
For configuring VLAN trunking on a security appliance interface, which three actions are mandatory? (Choose three.)
Which two options are correct about the threat detection feature of the Cisco ASA adaptive security appliance?
Which two options are correct about the threat detection feature of the Cisco ASA adaptive security appliance? (Choose two.)
Which three items are true about how the Cisco ASA adaptive security appliance handles multimedia applications
Multimedia applications transmit requests on TCP, get responses on UDP or TCP, use dynamic ports, and use the same port for source and destination, so they can pose challenges to a firewall. Which three items are true about how the Cisco ASA adaptive security appliance handles multimedia applications? (Choose three.)
Which three statements correctly describe protocol inspection on the Cisco ASA adaptive security appliance?
Which three statements correctly describe protocol inspection on the Cisco ASA adaptive security appliance? (Choose three.)
which two types of queues are available on the Cisco ASA security appliance?
While implementing QoS, which two types of queues are available on the Cisco ASA security appliance? (Choose two.)