What is the result of disabling ESMTP inspection?
What is the result of disabling ESMTP inspection?
Which three tasks are mandatory for creating and configuring a security context?
Which three tasks are mandatory for creating and configuring a security context? (Choose three. )
Which two statements accurately describe the downloadable ACL feature of the security appliance?
Which two statements accurately describe the downloadable ACL feature of the security appliance? (Choose two.)
Which three tasks does the administrator need to complete in order to accomplish the goal of limiting network
The network security administrator for XYZ Corporation wants to apply specific restrictions to one network user, Bob, who works from home and accesses the corporate network from the outside interface of the security appliance. The administrator decides to use the downloadable ACL feature of the security appliance to control network access for this user.
Authentication of inbound traffic is already configured on the security appliance, and Bob already has a user account on the Cisco Secure ACS. Which three tasks does the administrator need to complete in order to accomplish the goal of limiting network access for Bob via downloadable ACLs? (Choose three. )
How can the administrator set the following values?
The network security administrator for XYZ Corporation wants to adjust the default DoS drop rate thresholds for basic threat detection so that logs are triggered properly for the XYZ Corporation network environment. This will give the administrator more accurate information about the possibility of a DoS attack.
How can the administrator set the following values?
–Rate interval: 600 sec
–Average rate: 50 drops per sec
–Burst rate: 100 drops per sec
which two requirements must be met for active/standby failover to work?
With an adaptive security appliance code of version 7.0 or later, which two requirements must be met for active/standby failover to work? (Choose two.)
what two ways does a transparent mode security appliance differ from a routed mode security appliance?
In what two ways does a transparent mode security appliance differ from a routed mode security appliance? (Choose two.)
Which two statements accurately describe the threat detection feature of the Cisco ASA adaptive security appli
Which two statements accurately describe the threat detection feature of the Cisco ASA adaptive security appliance? (Choose two.)
Where would the administrator go in CIsco ASDM to accomplish this task?
The network administrator for XYZ Corporation configured a site-to-site VPN by using the IPsec VPN Wizard in Cisco ASDM. Now the administrator wants to modify the crypto ACL to specify different protected traffiC. Where would the administrator go in CIsco ASDM to accomplish this task?
Which two events take place during a stateful active/standby failover?
Which two events take place during a stateful active/standby failover? (Choose two.)