PrepAway - Latest Free Exam Questions & Answers

Which of the following configuration parameters is not …

Which of the following configuration parameters is not displayed on the Connection Profiles pane for clientless
SSL VPN connections in ASDM? (Select the best answer.)

PrepAway - Latest Free Exam Questions & Answers

A.
the authentication method to use

B.
the login page settings to use

C.
the interfaces to use

D.
the tunneling protocols to use

Explanation:
The tunneling protocols to use are not displayed on the Connection Profiles pane for clientless Secure Sockets
Layer (SSL) virtual private network (VPN) connections in Cisco Adaptive Security Device Manager (ASDM).
The Connection Profiles pane displays a quick summary of information related to the connection profiles that
have previously been configured. This pane also enables you to configure additional connection profiles. The
type of information displayed on the Connection Profiles pane includes the interfaces on the Cisco Adaptive
Security Appliance (ASA) that are enabled for VPN access, the login page settings, a list of connection profiles
that have been configured, the alias associated with the connection profiles, the authentication method to use
for connections made using the connection profiles, and the interfaces to use for connections made using the
connection profiles. An example of the Connection Profiles pane is shown in the following exhibit:

The Group Policies pane for clientless SSL VPN connections in ASDM displays a quick summary of information
relating to the group policies that are configured on the ASA. The type of information that is displayed on this
pane includes the tunneling protocols that are enabled for each group policy, the type of each group policy, andthe Authentication, Authorization, and Accounting (AAA) server group that is to be used by each group policy.
An example of the Group Policies pane is shown in the following exhibit:

Cisco: Configuring Clientless SSL VPN: Configuring Clientless SSL VPN Access

One Comment on “Which of the following configuration parameters is not …

  1. Nicole says:

    QUESTION 187
    Which three statements are characteristics of DHCP Spoofing? (Choose three.)

    A. Arp Poisoning
    B. Modify Traffic in transit
    C. Used to perform man-in-the-middle attack
    D. Physically modify the network gateway
    E. Protect the identity of the attacker by masking the DHCP address
    F. Can access most network devices

    Answer: BCD
    Explanation:
    In DHCP spoofing attacks, the attacker takes over the DHCP server role and can serve IP addresses and his IP address as default gateway. By doing that he performs a man-in-the-middle attack, and because all the traffic passes through his computer he can modify traffic in transit and he physically changed the default gateway.

    QUESTION 188
    In which two situations should you use in-band management? (Choose two)

    A. when a network device fails to forward packets
    B. when management applications need concurrent access to the device
    C. when you require ROMMON access
    D. when you require administrator’s access from multiple locations
    E. when the control plane fails to respond

    Answer: BD

    QUESTION 189
    Which three statements describe DHCP spoofing attacks? (Choose three.)

    A. They can modify traffic in transit.
    B. They are used to perform man-in-the-middle attacks.
    C. They use ARP poisoning.
    D. They can access most network devices.
    E. They protect the identity of the attacker by masking the DHCP address.
    F. They are can physically modify the network gateway.

    Answer: ABF

    QUESTION 190
    What security feature allows a private IP address to access the Internet by translating it to a public address?

    A. NAT
    B. hairpinning
    C. Trusted Network Detection
    D. Certification Authority

    Answer: A

    QUESTION 191
    Which Sourcefire event action should you choose if you want to block only malicious traffic
    from a particular end user?

    A. Allow with inspection
    B. Allow without inspection
    C. Block
    D. Trust
    E. Monitor

    Answer: A

    QUESTION 192
    Which NAT type allows only objects or groups to reference an IP address?

    A. dynamic NAT
    B. dynamic PAT
    C. static NAT
    D. identity NAT

    Answer: B

    QUESTION 193
    Which feature allows a dynamic PAT pool to select the next address in the PAT pool instead of the next port of an existing address?

    A. next IP
    B. round robin
    C. dynamic rotation
    D. NAT address rotation

    Answer: B

    More 210-260 Practice Tests: https://drive.google.com/drive/folders/0B75b5xYLjSSNV1RGaFJYZkxGWFk?usp=sharing




    1



    0

Leave a Reply