Why might you want to configure VLANs on a security appliance interface?
Why might you want to configure VLANs on a security appliance interface?
Which three actions would you be able to do with a Layer 3/4 modular policy?
Which three actions would you be able to do with a Layer 3/4 modular policy? (Choose three )
Which four steps for configuring a redundant interface and using it as a failover link are correct?
Which four steps for configuring a redundant interface and using it as a failover link are correct? (Choose four.)
What is the purpose of the redundant interface feature of the security appliance?
What is the purpose of the redundant interface feature of the security appliance?
Which three statements about protocol inspection on the Cisco ASA adaptive security appliance are true?
Which three statements about protocol inspection on the Cisco ASA adaptive security appliance are true? (Choose three. )
Which two statements accurately describe multiple context mode?
Which two statements accurately describe multiple context mode? (Choose two.)
Which two statements accurately describe the effects of this configuration?
Which two statements accurately describe the effects of this configuration? (Choose two.)
class-map INBOUND_HTTP_TRAFFIC
match access-list TOINSIDEHOST
class-map OUTBOUND_HTTP_TRAFFIC
match access-list TOOUTSIDEHOST
policy-map MYPOLICY
class INBOUND_HTTP_TRAFFIC
inspect http
set connection conn-max 100
policy-map MYOTHERPOLICY
class OUTBOUND_HTTP_TRAFFIC
inspect http
service-policy MYOTHERPOLICY interface inside
service-policy MYPOLICY interface outside
Which three steps are mandatory for configuring VLAN trunking on a security appliance interface?
Which three steps are mandatory for configuring VLAN trunking on a security appliance interface? (Choose three. )
Which three tasks are required to accomplish this goal?
To require users to authenticate before accessing the corporate DMZ servers, the network security administrator needs to configure cut-through proxy authentication via RADIUS. Which three tasks are required to accomplish this goal? (Choose three. )
Which four parameters must be defined in an IKE policy when creating an IPsec site-to-site VPN?
Which four parameters must be defined in an IKE policy when creating an IPsec site-to-site VPN? (Choose four.)