PrepAway - Latest Free Exam Questions & Answers

Tag: 642-617

What other configuration is missing?

The ASA administrator wants to configure Botnet Traffic Filter using the dynamic database but it is not working properly after the initiate configuration has been entered. What other configuration is missing?

When the Cisco ASA detects scanning attacks, how long is the attacker who is performing the scan shunned?

When the Cisco ASA detects scanning attacks, how long is the attacker who is performing the scan shunned?

Where in the ACS are the individual downloadable ACL statements configured to achieve the most scalable deploy

Where in the ACS are the individual downloadable ACL statements configured to achieve the most scalable deployment?


Page 4 of 7« First...23456...Last »