Which three of these choices are potential groups of users for clientless SSL VPNs?
Which three of these choices are potential groups of users for clientless SSL VPNs? (Choose
three.)
Which one of the following commands can reactivate the primary adaptive security appliance and restore it to a
Tom works as a network administrator for the P4S company. The primary adaptive security
appliance in an active/standby failover configuration failed, so the secondary adaptive security
appliance was automatically activated. Tom then fixed the problem. Now he would like to restore
the primary to active status. Which one of the following commands can reactivate the primary
adaptive security appliance and restore it to active status while issued on the primary adaptive
security appliance?
Which three tasks are needed to achieve this goal?
The security department of the P4S company wants to configure cut-through proxy authentication
via RADIUS to require users to authenticate before accessing the corporate DMZ servers. Which
three tasks are needed to achieve this goal? (Choose three.)
Which two statements correctly describe the local user database in the security appliance?
Which two statements correctly describe the local user database in the security appliance?
(Choose two.)
Which two configurations of the port forwarding list will allow remote users to access the internal email R
John works as a network engineer for your company. Study the following exhibit carefully. John is
asked to configure Cisco ASA security appliance for port forwarding access to the internal e-mail
server running POP3 (TCP port 110) and SMTP (TCP port 25). Which two configurations of the
port forwarding list will allow remote users to access the internal email server through port
forwarding? (Choose two.)
Which step will be taken by the Cisco Adaptive Security Appliance on FTP traffic entering its outside interfac
Modular Policy Framework provides a consistent and flexible way to configure security appliance
features in a manner similar to Cisco IOS software QoS CLI. Your company asked you to examine
the current Cisco Modular Policy Framework configurations on the LA-ASA Cisco Adaptive
Security Appliance (ASA) by use of the Cisco Adaptive Security Device Manager (ASDM).
Which step will be taken by the Cisco Adaptive Security Appliance on FTP traffic entering its
outside interface?
which three ways?
A Cisco ASA security appliance can obtain a certificate revocation list from a certificate authority in
which three ways? (Choose three.)
which two interfaces will a connection traverse when it is coming from the Internet and connecting to the web
You work as a network engineer for your company. Recently, you have been tasked with verifying
the Cisco ASA security appliance interfaces that are used for a web connection from the Internet
to a DMZ web server. According to the presented Configuration > Device Setup > Interfaces pane,
which two interfaces will a connection traverse when it is coming from the Internet and connecting
to the web server with the IP address 172.16.20.10? (Choose two.)
Which protocol will the Cisco VPN client use to retrieve the digital certificate from the CA server?
which IPsec standard is not supported on the Cisco ASA security appliance?
Internet Protocol Security (IPsec) is a suite of protocols for securing Internet Protocol (IP)
communications by authenticating and encrypting each IP packet of a data stream. With Cisco
ASA Adaptive Security Appliance Software Version 7.x and later, which IPsec standard is not
supported on the Cisco ASA security appliance?