what three ways is FTP handled on the security appliance?
The network security administrator for XYZ Corporation creates an FTP inspection policy that includes the strict option and applies it to the outside interface of the corporate adaptive security appliancD. After this policy is applied, in what three ways is FTP handled on the security appliance? (Choose three )
Which three options does the Cisco ASDM IPsec VPN Wizard require you to configure when setting up a remote acc
Which three options does the Cisco ASDM IPsec VPN Wizard require you to configure when setting up a remote access VPN? (Choose three. )
Which two of the following statements are true about the local user database in the security appliance?
Which two of the following statements are true about the local user database in the security appliance? (Choose two.)
What are three basic components of the Cisco Modular Policy Framework?
What are three basic components of the Cisco Modular Policy Framework? (Choose three )
Which command set will bootstrap the transparent firewall and prepare it for configuration via Cisco ASDM?
Which command set will bootstrap the transparent firewall and prepare it for configuration via Cisco ASDM?
Which command, when issued on the primary adaptive security appliance, will reactivate the primary adaptive se
The primary adaptive security appliance in an active/standby failover configuration failed, so the secondary adaptive security appliance was automatically activateD. The network administrator then fixed the problem.
Now the administrator wants to return the primary to active status. Which command, when issued on the primary adaptive security appliance, will reactivate the primary adaptive security appliance and restore it to active status?
Which three types of information can be found in the syslog output for an adaptive security appliance?
Which three types of information can be found in the syslog output for an adaptive security appliance? (Choose three. )
Which list contains the correct steps for upgrading the license (activation key) for your security appliance f
Which list contains the correct steps for upgrading the license (activation key) for your security appliance from Cisco ASDM?
Which set of steps does the administrator need to take to obtain this information?
The adaptive security appliance at Company XYZ corporate headquarters has recently been logging more threats and anomalies than usual. The network security administrator is unsure of the severity of these potential threats and anomalies. To get a broader view of the overall situation and determine what action to take, the administrator wants to gather information on threat-related protocols and ports. For example, the administrator wants to know about bursts on a particular port or protocol or on a set of ports and protocols.
Which set of steps does the administrator need to take to obtain this information?
Which event triggers failover at the failover group level in an active/active failover configuration?
Which event triggers failover at the failover group level in an active/active failover configuration?