Which four tunneling protocols are enabled in the DfltGrpPolicy group policy?
Scenario In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. To access ASDM, click the ASA icon in the topology diagram. Note: Not all ASDM functionalities are enabled in this simulation....
Which type of PVLAN port allows communication from all port types?
Which type of PVLAN port allows communication from all port types?A . isolatedB . communityC . in-lineD . promiscuousView AnswerAnswer: D
Which type of security control is defense in depth?
Which type of security control is defense in depth?A . Threat mitigationB . Risk analysisC . Botnet mitigationD . Overt and covert channelsView AnswerAnswer: A
Which two primary security concerns can you mitigate with a BYOD solution? (Choose two)
Which two primary security concerns can you mitigate with a BYOD solution? (Choose two)A . Schedule for patching the deviceB . compliance with applicable policiesC . device lagging and inventoryD . Connections to public Wi-Fi networksE . Securing access to a trusted corporate network.View AnswerAnswer: BE
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?A . Deny the connection inline.B . Perform a Layer 6 reset.C . Deploy an antimalware system.D . Enable bypass mode.View AnswerAnswer: A
Which options are filtering options used to display SDEE message types? (Choose two.)
Which options are filtering options used to display SDEE message types? (Choose two.)A . stopB . noneC . errorD . allView AnswerAnswer: C,D
With which NTP server has the router synchronized?
Refer to the exhibit. With which NTP server has the router synchronized?A . 192.168.10.7B . 108.61.73.243C . 209.114.111.1D . 132.163.4.103E . 204.2.134.164F . 241.199.164.101View AnswerAnswer: A
Which TACACS+ server-authentication protocols are supported on Cisco ASA firewalls? (Choose three.)
Which TACACS+ server-authentication protocols are supported on Cisco ASA firewalls? (Choose three.)A . EAPB . ASCIIC . PAPD . PEAPE . MS-CHAPv1F . MS-CHAPv2View AnswerAnswer: B,C,E
Which command help user1 to use enable,disable,exit&etc commands?
Which command help user1 to use enable,disable,exit&etc commands?A . catalyst1(config)#username user1 privilege 0 secret us1passB . catalyst1(config)#username user1 privilege 1 secret us1passC . catalyst1(config)#username user1 privilege 2 secret us1passD . catalyst1(config)#username user1 privilege 5 secret us1passView AnswerAnswer: A
How can FirePOWER block malicious email attachments?
How can FirePOWER block malicious email attachments?A . It forwards email requests to an external signature engine.B . It scans inbound email messages for known bad URLs.C . It sends the traffic through a file policy.D . It sends an alert to the administrator to verify suspicious email messages.View AnswerAnswer:...