When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?
Select one:
to bind the interface to the ISAKMP policy
to identify the location of the peer
to create the ISAKMP policy
to create the crypto map
Which type of security policy includes defined rules and procedures for creating and maintaining
password security?
Select one:
end-user policy
acceptable use policy
technical policy
governing policy
What type of network security test can detect and report changes made to network systems?
Select one:
vulnerability scanning
integrity checking
penetration testing
network scanning
What component of a security policy explicitly defines the type of traffic allowed on a network and
what users are allowed and not allowed to do?
Select one:
identification and authentication policies
remote access policies
acceptable use policies
password policies
Which solution allows workers to telecommute effectively and securely?
Select one:
dial-up connection
DSL connection
remote-access VPN
site-to-site VPN
In the prosecution of an individual, what answers the question of why the individual committed an
illegal act?
Select one:
means
opportunity
motive
complexity
True or False?
Cisco AnyConnect Secure Mobility Client can be configured to automatically create a VPN
connection that remains up until the user logs out or the session timer expires.
Select one:
true
false
What is the purpose of configuring an IP address on an ASA device in transparent mode?
Select one:
management
routing
VPN connectivity
NAT
What type of network security test can detect and report changes made to network systems?
Select one:
integrity checking
penetration testing
vulnerability scanning
network scanning
When testing the tunnel to verify a site-to-site VPN connection between an ISR and an ASA,
why does an initial ping fail, but subsequent pings succeed?
Select one:
The ASA and ISR must negotiate the tunnel parameters.
The ISR has an incorrect configuration.
The first ping is not considered interesting traffic.
The connection was not successful.
What is the most trustworthy security level that can be configured on an ASA device interface?
Select one:
100
50
255
What type of security test uses simulated attacks to determine possible consequences of a real
threat?
Select one:
vulnerability scanning
penetration testing
network scanning
integrity checking
In the prosecution of an individual, what answers the question of why the individual committed
an illegal act?
Select one:
opportunity
complexity
motive
means
What step must be taken before investigators can determine if data tampering has occurred?
Select one:
Flush the system memory.
Reboot the machine.
Create a drive image of the original hard drive.
Photograph the equipment that is involved.
How is success measured in the implementation of a security awareness program throughout a
large organization?
Select one:
a reduction of unauthorized actions by insiders
a noticeable increase in attendance at educational programs
a reduction of logged attacks by outsiders
a noticeable increase in the access and use of procedure documents
What is the purpose of configuring an IP address on an ASA device in transparent mode?
Select one:
routing
NAT
VPN connectivity
management
Which three detailed documents are used by security staff for an organization to implement the
security policies? (Choose three.)
Select one or more:
standards
procedures
risk assessment
best practices
asset inventory
guidelines
By default, which type of certificate is used by an ASA 5505 for client authentication?
Select one:
third-party certificate
purchased certificate
No certificates are used by default. The type must be specified.
self-signed certificate
When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered in the
Peer Device Identification window?
Select one:
the IP address of the peer
the MAC address of the outbound interface
the IP address of the outbound interface
the MAC address of the peer
Which network security tool can detect open TCP and UDP ports on most versions of Microsoft
Windows?
Select one:
SuperScan
Nmap
L0phtcrack
Zenmap
What type of security test uses simulated attacks to determine possible consequences of a real
threat?
Select one:
penetration testing
network scanning
vulnerability scanning
integrity checking
Which ASDM wizard would allow a network administrator to configure an ASA for NAT/PAT?
Select one:
VPN wizards
ASDM Identify Certificate Wizard‹
High Availability and Scalability Wizard
Startup Wizard
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?
Select one:
to create the crypto map
to bind the interface to the ISAKMP policy
to identify the location of the peer
to create the ISAKMP policy
Which executive position is responsible for all IT and computer systems that support enterprise
goals?
Select one:
Chief Security Officer
Chief Executive Officer
Chief Information Officer
Chief Technology Officer
When testing the tunnel to verify a site-to-site VPN connection between an ISR and an ASA,
why does an initial ping fail, but subsequent pings succeed?
Select one:
The first ping is not considered interesting traffic.
The connection was not successful.
The ISR has an incorrect configuration.
The ASA and ISR must negotiate the tunnel parameters.
Refer to the exhibit. A network administrator is configuring PAT on an ASA device to enable
internal workstations to access the Internet. Which configuration command should be used next?
Select one:
nat (inside,outside) dynamic NET1
nat (outside,inside) dynamic interface
nat (inside,outside) dynamic interface
nat (outside,inside) dynamic NET1
Which network security tool can detect open TCP and UDP ports on most versions of Microsoft
Windows?
Select one:
L0phtcrack
Nmap
SuperScan
Zenmap
Which object or object group is required to implement NAT on an ASA 5505 device?
Select one:
service object
protocol object group
network object
network object group
Which type of documents offer suggestions on how to do things more securely within an
organization and contain best practices?
Select one:
end user policies
procedures
standards
guidelines
Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)
Select one or more:
Zone-Based Policy Firewall
intrusion prevention system
VPN concentrator
Cisco Unified Communications (voice and video) security
stateful firewall
content security and control module
Which three detailed documents are used by security staff for an organization to implement the
security policies? (Choose three.)
Select one or more:
procedures
best practices
risk assessment
asset inventory
standards
guidelines
Which type of security policy includes defined rules and procedures for creating and maintaining
password security?
Select one:
end-user policy
governing policy
technical policy
acceptable use policy
What step must be taken before investigators can determine if data tampering has occurred?
Select one:
Photograph the equipment that is involved.
Reboot the machine.
Create a drive image of the original hard drive.
Flush the system memory.
Which solution allows workers to telecommute effectively and securely?
Select one:
remote-access VPN
DSL connection
site-to-site VPN
dial-up connection
True or False?
If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.
Select one:
false
true
What is one benefit of using ASDM to configure a Cisco ASA?
Select one:
It does not require a remote connection to a Cisco device.
It is easier to use.
It does not require any knowledge of networking.
It does not require software setup to begin configuration.
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?
Select one:
to bind the interface to the ISAKMP policy
to create the ISAKMP policy
to create the crypto map
to identify the location of the peer
What component of a security policy explicitly defines the type of traffic allowed on a network
and what users are allowed and not allowed to do?
Select one:
acceptable use policies
remote access policies
password policies
identification and authentication policies
When testing the tunnel to verify a site-to-site VPN connection between an ISR and an ASA,
why does an initial ping fail, but subsequent pings succeed?
Select one:
The connection was not successful.
The first ping is not considered interesting traffic.
The ASA and ISR must negotiate the tunnel parameters.
The ISR has an incorrect configuration.
Refer to the exhibit. Which ASDM Device Management item would be used to configure a banner
message on the ASA?
Select one:
System Image/Configuration
Licensing
Advanced
Management Access
True or False?
The effectiveness of an operations security solution can only be tested once a real threat occurs.
Select one:
true
false
True or False?
Cisco AnyConnect Secure Mobility Client can be configured to automatically create a VPN
connection that remains up until the user logs out or the session timer expires.
Select one:
true
false
Where is the Cisco AnyConnect client image found on the Cisco ASA?
Select one:
ROM
TFTP server
flash
RAM
What step must be taken before investigators can determine if data tampering has occurred?
Select one:
Create a drive image of the original hard drive.
Reboot the machine.
Photograph the equipment that is involved.
Flush the system memory.
Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)
Select one or more:
stateful firewall
intrusion prevention system
content security and control module
Zone-Based Policy Firewall
Cisco Unified Communications (voice and video) security
VPN concentrator
Refer to the exhibit. A network administrator is verifying the security configuration of an ASA.
Which command produces the exhibited output?
Select one:
show switch vlan
show interface ip brief
show ip interface brief
show vlan
Which statement is true about ASA CLI and IOS CLI commands?
Select one:
The show ip interface brief command is valid for both CLIs.‹
The ASA CLI does not recognize the write erase command, but the IOS CLI does.
Only the ASA CLI requires the use of Ctrl-C to interrupt show commands.
Both CLIs recognize the Tab key to complete a partial command.
Where is the Cisco AnyConnect client image found on the Cisco ASA?
Select one:
RAM
flash
TFTP server
ROM
How is success measured in the implementation of a security awareness program throughout a
large organization?
Select one:
a noticeable increase in attendance at educational programs
a reduction of unauthorized actions by insiders
a noticeable increase in the access and use of procedure documents
a reduction of logged attacks by outsiders
What component of a security policy explicitly defines the type of traffic allowed on a network
and what users are allowed and not allowed to do?
Select one:
remote access policies
acceptable use policies
identification and authentication policies
password policies
True or False?
If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.
Select one:
true
false
Refer to the exhibit. What kind of NAT is configured on the ASA device?
Select one:
dynamic PAT
dynamic NAT
static NAT
Twice NAT
What network testing tool is used for password auditing and recovery?
Select one:
Metasploit
SuperScan
L0phtcrack
Nessus
Refer to the exhibit. Which Device Setup ASDM menu option would be used to configure the
ASA for the current date?
Select one:
Routing
System Time
Startup Wizard
Interfaces
Device Name/Password
When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered in the
Peer Device Identification window?
Select one:
the MAC address of the peer
the MAC address of the outbound interface
the IP address of the peer
the IP address of the outbound interface
Refer to the exhibit. A network administrator is configuring PAT on an ASA device to enable
internal workstations to access the Internet. Which configuration command should be used next?
Select one:
nat (inside,outside) dynamic NET1
nat (outside,inside) dynamic NET1
nat (outside,inside) dynamic interface
nat (inside,outside) dynamic interface
The ASA device can be configured using either the asdm
or the command-line interface.
True or False?
If the end-user community does not adhere to security policies and procedures, any implemented
network security system can be defeated.
Select one:
false
true
Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)
Select one or more:
VPN concentrator
stateful firewall
content security and control module
Cisco Unified Communications (voice and video) security
Zone-Based Policy Firewall
intrusion prevention system
What is the most trustworthy security level that can be configured on an ASA device interface?
Select one:
50
100
255
Which ASDM wizard would allow a network administrator to configure an ASA for NAT/PAT?
Select one:
VPN wizards
ASDM Identify Certificate Wizard‹
Startup Wizard
High Availability and Scalability Wizard
True or False?
Cisco AnyConnect Secure Mobility Client can be configured to automatically create a VPN
connection that remains up until the user logs out or the session timer expires.
Select one:
true
false
What are the two methods that can be used to start the Cisco ASDM? (Choose two.)
Select one or more:
Run Cisco ASDM as a local service.
Run Cisco ASDM as a local application.
Run Cisco ASDM as a flash application.
Run Cisco ASDM as a Java Web Start application.
Run Cisco ASDM as a local startup application.
In the prosecution of an individual, what answers the question of why the individual committed an
illegal act?
Select one:
motive
means
complexity
opportunity
Which object or object group is required to implement NAT on an ASA 5505 device?
Select one:
protocol object group
network object group
service object
network object
Which three detailed documents are used by security staff for an organization to implement the
security policies? (Choose three.)
Select one or more:
risk assessment
guidelines
best practices
standards
procedures
asset inventory
Refer to the exhibit. What kind of NAT is configured on the ASA device?
Select one:
Twice NAT
static NAT
dynamic NAT
dynamic PAT
True or False?
If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.
Select one:
true
false
Refer to the exhibit. A network administrator is configuring AAA implementation on an ASA
device. What does the option link3 indicate?
Select one:
the network name where the AAA server resides
the sequence of servers in the AAA server group
the specific AAA server name
the interface name
What is the purpose of configuring an IP address on an ASA device in transparent mode?
Select one:
routing
NAT
management
VPN connectivity
How is success measured in the implementation of a security awareness program throughout a
large organization?
Select one:
a reduction of unauthorized actions by insiders
a noticeable increase in attendance at educational programs
a noticeable increase in the access and use of procedure documents
a reduction of logged attacks by outsiders
Which object or object group is required to implement NAT on an ASA 5505 device?
Select one:
service object
protocol object group
network object
network object group
Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)
Select one or more:
Zone-Based Policy Firewall
content security and control module
stateful firewall
Cisco Unified Communications (voice and video) security
VPN concentrator
intrusion prevention system
What step must be taken before investigators can determine if data tampering has occurred?
Select one:
Flush the system memory.
Photograph the equipment that is involved.
Create a drive image of the original hard drive.
Reboot the machine.
Which solution allows workers to telecommute effectively and securely?
Select one:
site-to-site VPN
DSL connection
remote-access VPN
dial-up connection
What type of network security test can detect and report changes made to network systems?
Select one:
integrity checking
Refer to the exhibit. Which three sets of configuration commands were entered on the ASA
5505? (Choose three.)
interface vlan 2
nameif outside
security-level 0
ip address 209.165.200.226 255.255.255.248
route outside 0.0.0.0 0.0.0.0 209.165.200.225
interface e0/0
switchport access vlan 2
no shut
exit
Refer to the exhibit. A network administrator is configuring AAA implementation on an ASA
device. What does the option link3 indicate?
Select one:
the interface name
the specific AAA server name
the network name where the AAA server resides
the sequence of servers in the AAA server group
What type of network security test can detect and report changes made to network systems?
Select one:
network scanning
penetration testing
vulnerability scanning
integrity checking
Which ASDM wizard would allow a network administrator to configure an ASA for NAT/PAT?
Select one:
High Availability and Scalability Wizard
ASDM Identify Certificate Wizard‹
Startup Wizard
VPN wizards
When testing the tunnel to verify a site-to-site VPN connection between an ISR and an ASA,
why does an initial ping fail, but subsequent pings succeed?
Select one:
The ASA and ISR must negotiate the tunnel parameters.
The ISR has an incorrect configuration.
The first ping is not considered interesting traffic.
The connection was not successful.
By default, which type of certificate is used by an ASA 5505 for client authentication?
Select one:
third-party certificate
purchased certificate
No certificates are used by default. The type must be specified.
self-signed certificate
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?
Select one:
to create the ISAKMP policy
to bind the interface to the ISAKMP policy
to create the crypto map
to identify the location of the peer
Refer to the exhibit. A network administrator is verifying the security configuration of an ASA.
Which command produces the exhibited output?
Select one:
show vlan
show interface ip brief
show ip interface brief
show switch vlan
Refer to the exhibit. Which ASDM Device Management item would be used to configure a banner
message on the ASA?
Select one:
Advanced
Management Access
Licensing
System Image/Configuration
Refer to the exhibit. Which ASDM Device Management item would be used to configure a banner
message on the ASA?
Select one:
Licensing
System Image/Configuration
Advanced
Management Access
What is one benefit of using ASDM to configure a Cisco ASA?
Select one:
It does not require software setup to begin configuration.
It is easier to use.
It does not require any knowledge of networking.
It does not require a remote connection to a Cisco device.
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?
Select one:
to identify the location of the peer
to create the ISAKMP policy
to create the crypto map
to bind the interface to the ISAKMP policy
True or False?
Cisco AnyConnect Secure Mobility Client can be configured to automatically create a
VPN connection that remains up until the user logs out or the session timer expires.
Select one:
false
true
What two features must match between ASA devices to implement a failover configuration?
(Choose two.)
Select one or more:
amount of RAM
software configuration
source IP address
next-hop destination
device model
When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered in the
Peer Device Identification window?
Select one:
the IP address of the peer
What is one benefit of using ASDM to configure a Cisco ASA?
Select one:
It does not require any knowledge of networking.
It does not require software setup to begin configuration.
It does not require a remote connection to a Cisco device.
It is easier to use.
Which network security tool can detect open TCP and UDP ports on most versions of Microsoft
Windows?
Select one:
Nmap
The ASA device can be configured using either the ASDM or the command-line interface.
Refer to the exhibit. A network administrator is configuring AAA implementation on an ASA
device. What does the option link3 indicate?
Select one:
the interface name
Which type of security policy includes defined rules and procedures for creating and maintaining
password security?
Select one:
governing policy
acceptable use policy
end-user policy
technical policy
If an AAA authentication server is not available, then the local database is used for
authentication.
What network testing tool is used for password auditing and recovery?
Select one:
L0phtcrack
Nessus
SuperScan
Metasploit
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?
Select one:
to bind the interface to the ISAKMP policy
to create the ISAKMP policy
to create the crypto map
to identify the location of the peer
ciscoasa(config)# access-list OUT-TO-IN extended permit protocol 198.133.219.32
255.255.255.224 host 209.165.200.242
What two options can be used for the keyword protocol? (Choose two.)
Select one or more:
ICMP
protocol object-group
Which solution allows workers to telecommute effectively and securely?
Select one:
remote-access VPN
Where is an IP address configured on an ASA 5505 device?
Select one:
VTY lines
physical Layer2 interface
SVI interface
physical Layer 3 interface
True or False?
Cisco AnyConnect Secure Mobility Client can be configured to automatically create a
VPN connection that remains up until the user logs out or the session timer expires.
Select one:
true
false
What is the most trustworthy security level that can be configured on an ASA device
interface?
Select one:
50
255
100
Refer to the exhibit. Which Device Setup ASDM menu option would be used to configure
the ASA for the current date?
Select one:
Device Name/Password
Interfaces
System Time
Routing
Startup Wizard
Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)
Select one or more:
Cisco Unified Communications (voice and video) security
content security and control module
VPN concentrator
stateful firewall
intrusion prevention system
Zone-Based Policy Firewall
When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered
in the Peer Device Identification window?
Select one:
the MAC address of the peer
the IP address of the peer
the MAC address of the outbound interface
the IP address of the outbound interface
Refer to the exhibit. A network administrator is configuring AAA implementation on an
ASA device. What does the option link3 indicate?
Select one:
the specific AAA server name
the interface name
the sequence of servers in the AAA server group
the network name where the AAA server resides
What type of security test uses simulated attacks to determine possible consequences of
a real threat?
Select one:
integrity checking
penetration testing
network scanning
vulnerability scanning
What is the most trustworthy security level that can be configured on an ASA device
interface?
Select one:
255
50
100
Refer to the exhibit. A network administrator is verifying the security configuration of an
ASA. Which command produces the exhibited output?
Select one:
show vlan
show ip interface brief
show switch vlan
show interface ip brief
Fill in the blank.
The Device Management ASDM configuration option can be used to configure
management access, users and AAA access, DHCP, and a master: passphrase
The ASA device can be configured using either the ASDM or the command-line interface.
Which object or object group is required to implement NAT on an ASA 5505 device?
Select one:
protocol object group
network object
network object group
service object
True or False?
If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.
Select one:
true
false
Which type of security policy includes defined rules and procedures for creating and
maintaining password security?
Select one:
end-user policy
governing policy
technical policy
acceptable use policy
True or False?
Cisco AnyConnect Secure Mobility Client can be configured to automatically create a
VPN connection that remains up until the user logs out or the session timer expires.
Select one:
true
false
Which ASDM wizard would allow a network administrator to configure an ASA for
NAT/PAT?
Select one:
Startup Wizard
ASDM Identify Certificate Wizard
High Availability and Scalability Wizard
VPN wizards
What is the default group policy name on an ASA 5505 device?
Select one:
DfltGrpPolicy
Dflt Grp Policy
Dflt.Grp.Policy
Dflt-Grp-Policy
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the
purpose of the crypto map command in interface configuration mode?
Select one:
to bind the interface to the ISAKMP policy
to identify the location of the peer
to create the ISAKMP policy
to create the crypto map
Which network security tool can detect open TCP and UDP ports on most versions of
Microsoft Windows?
Select one:
Nmap
SuperScan
Zenmap
L0phtcrack
What are the two methods that can be used to start the Cisco ASDM? (Choose two.)
Select one or more:
Run Cisco ASDM as a local application.
Run Cisco ASDM as a local service.
Run Cisco ASDM as a flash application.
Run Cisco ASDM as a Java Web Start application.
Run Cisco ASDM as a local startup application.
True or False?
The effectiveness of an operations security solution can only be tested once a real threat
occurs.
Select one:
true
false
Refer to the exhibit. A network administrator is verifying the security configuration of an
ASA. Which command produces the exhibited output?
Select one:
show switch vlan
show vlan
show ip interface brief
show interface ip brief
When testing the tunnel to verify a site-to-site VPN connection between an ISR and an
ASA, why does an initial ping fail, but subsequent pings succeed?
Select one:
The first ping is not considered interesting traffic.
The connection was not successful.
The ASA and ISR must negotiate the tunnel parameters.
The ISR has an incorrect configuration.
What type of security test uses simulated attacks to determine possible consequences of
a real threat?
Select one:
vulnerability scanning
integrity checking
penetration testing
network scanning
By default, which type of certificate is used by an ASA 5505 for client authentication?
Select one:
purchased certificate
No certificates are used by default. The type must be specified.
self-signed certificate
third-party certificate
Which three detailed documents are used by security staff for an organization to
implement the security policies? (Choose three.)
Select one or more:
risk assessment
best practices
asset inventory
standards
procedures
guidelines
Where is an IP address configured on an ASA 5505 device?
Select one:
VTY lines
physical Layer 3 interface
SVI interface
physical Layer2 interface
How is success measured in the implementation of a security awareness program
throughout a large organization?
Select one:
a noticeable increase in the access and use of procedure documents
a noticeable increase in attendance at educational programs
a reduction of logged attacks by outsiders
a reduction of unauthorized actions by insiders
True or False?
The effectiveness of an operations security solution can only be tested once a real threat occurs.
Select one:
false
True or False?
If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.
true
Which statement is true about ASA CLI and IOS CLI commands?
Both CLIs recognize the Tab key to complete a partial command.
How is success measured in the implementation of a security awareness program throughout a
large organization?
Select one:
a reduction of unauthorized actions by insiders
What type of network security test can detect and report changes made to network systems?
Select one:
integrity checking
Which object or object group is required to implement NAT on an ASA 5505 device?
Select one:
network object
Where is the Cisco AnyConnect client image found on the Cisco ASA?
Select one:
RAM
TFTP server
flash
ROM
When testing the tunnel to verify a site-to-site VPN connection between an ISR and an
ASA, why does an initial ping fail, but subsequent pings succeed?
Select one:
The ASA and ISR must negotiate the tunnel parameters.
The connection was not successful.
The first ping is not considered interesting traffic.
The ISR has an incorrect configuration.
Which network security tool can detect open TCP and UDP ports on most versions of
Microsoft Windows?
Select one:
Zenmap
L0phtcrack
SuperScan
Nmap
What network testing tool is used for password auditing and recovery?
Select one:
Metasploit
L0phtcrack
Nessus
SuperScan
True or False?
If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.
Select one:
true
false
Refer to the exhibit. A network administrator is configuring AAA implementation on an
ASA device. What does the option link3 indicate?
Select one:
the interface name
the specific AAA server name
the sequence of servers in the AAA server group
the network name where the AAA server resides
How is success measured in the implementation of a security awareness program
throughout a large organization?
Select one:
a reduction of logged attacks by outsiders
a reduction of unauthorized actions by insiders
a noticeable increase in attendance at educational programs
a noticeable increase in the access and use of procedure documents
In the prosecution of an individual, what answers the question of why the individual
committed an illegal act?
Select one:
complexity
motive
opportunity
means
True or False?
Cisco AnyConnect Secure Mobility Client can be configured to automatically create a
VPN connection that remains up until the user logs out or the session timer expires.
Select one:
true
false
True or False?
The effectiveness of an operations security solution can only be tested once a real threat
occurs.
Select one:
true
false
Which executive position is responsible for all IT and computer systems that support
enterprise goals?
Select one:
Chief Technology Officer
Chief Security Officer
Chief Executive Officer
Chief Information Officer
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the
purpose of the crypto map command in interface configuration mode?
Select one:
to identify the location of the peer
to create the ISAKMP policy
to create the crypto map
to bind the interface to the ISAKMP policy
What two features must match between ASA devices to implement a failover configuration?
(Choose two.)
Select one or more:
software configuration
amount of RAM
device model
source IP address
next-hop destination
Where is the Cisco AnyConnect client image found on the Cisco ASA?
Select one:
flash
In the prosecution of an individual, what answers the question of why the individual committed
an illegal act?
Select one:
motive
When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered in the
Peer Device Identification window?
Select one
the IP address of the peer