Which two scenarios accurately illustrate the effect of the configuration that is shown in the exhibit?
Refer to the exhibit. Which two scenarios accurately illustrate the effect of the configuration that is shown in the exhibit? (Choose two.)
Which command should the administrator execute on the primary unit?
Refer to the exhibit. Two adaptive security appliances are configured for active/active failover. On the primary security appliance, context admin is active and CTX2 is on standby. The administrator wants to activate CTX2. Which command should the administrator execute on the primary unit?
What must the administrator place in field A (AAA Client Hostname) and field B (AAA Client IP Address)?
Refer to the exhibit. A network administrator wants to authenticate remote users who are accessing the WEB1 server from the Internet. When a remote user initiates a session to the WEB1 server, the ASA1 security appliance will verify the credentials of the user with the TX_ACS AAA server via RADIUS. To accomplish this, the administrator must load and configure Cisco Secure ACS software on the TX_ACS AAA server. During the process, the administrator must correctly configure the AAA client information in the Cisco Secure ACS network configuration window.
What must the administrator place in field A (AAA Client Hostname) and field B (AAA Client IP Address)?
Which three effects will this configuration have when applied to the default global inspection policy?
Refer to the exhibit. Which three effects will this configuration have when applied to the default global inspection policy? (Choose three. )
Which two statements about the exhibit are true?
Refer to the exhibit. Which two statements about the exhibit are true? (Choose two.)
which (unlike other Company XYZ hosts) are using public, routable IP addresses. Neither NAT statements nor acc
Refer to the exhibit. The only traffic that the Company XYZ network administrator wants to allow through the corporate Cisco ASA adaptive security appliance is inbound HTTP to the DMZ network and all traffic from the inside network to the outside network. The administrator has configured the Cisco ASA adaptive security appliance, and access through it is now working as desired with one exception: contractors working on the DMZ servers have been surfing the Internet from the DMZ servers, which (unlike other Company XYZ hosts) are using public, routable IP addresses. Neither NAT statements nor access lists have been configured for the DMZ interface Why are the contractors able to surf the Internet from the DMZ servers?
(Note: The 192.168.X.X IP addresses are used to represent routable public IP addresses even though the 192.168.1.0 network is not actually a public routable network.)
Which task or set of tasks does the administrator need to complete to enable all hosts on DMZ2 to make HTTP co
Refer to the exhibit. The network administrator for this site wants hosts on DMZ2 to be able to make HTTP connections to host 172.16.1.10. Hosts on DMZ2 are currently unable to make these connections.
The network administrator checks the security appliance and determines that there are no access lists configured on either the DMZ1 or DMZ2 interface.
Which task or set of tasks does the administrator need to complete to enable all hosts on DMZ2 to make HTTP connections to host 172.16.1.10?
Which three commands would verify that the boot image is asa802-k8.bin?
Refer to the exhibit. Which three commands would verify that the boot image is asa802-k8.bin? (Choose three. )
Which two statements about configuring passive RIP on the security appliance are true?
Refer to the exhibit. Which two statements about configuring passive RIP on the security appliance are true? (Choose two.)
what two ways can you decrease the amount of time it takes for an active Cisco ASA
In what two ways can you decrease the amount of time it takes for an active Cisco ASA adaptive security appliance to fail over to its standby failover peer in an active/active failover configuration? (Choose two.)