Экономика

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 37

When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose

of the crypto map command in interface configuration mode?

Select one:

to bind the interface to the ISAKMP policy

to identify the location of the peer

to create the ISAKMP policy

to create the crypto map

Which type of security policy includes defined rules and procedures for creating and maintaining
password security?

Select one:

end-user policy

acceptable use policy

technical policy

governing policy

What type of network security test can detect and report changes made to network systems?

Select one:

vulnerability scanning

integrity checking

penetration testing

network scanning

What component of a security policy explicitly defines the type of traffic allowed on a network and
what users are allowed and not allowed to do?

Select one:

identification and authentication policies

remote access policies

acceptable use policies

password policies
Which solution allows workers to telecommute effectively and securely?

Select one:

dial-up connection

DSL connection

remote-access VPN

site-to-site VPN

In the prosecution of an individual, what answers the question of why the individual committed an
illegal act?

Select one:

means

opportunity

motive

complexity

True or False?

Cisco AnyConnect Secure Mobility Client can be configured to automatically create a VPN
connection that remains up until the user logs out or the session timer expires.

Select one:

true

false

What is the purpose of configuring an IP address on an ASA device in transparent mode?

Select one:

management

routing

VPN connectivity

NAT
What type of network security test can detect and report changes made to network systems?

Select one:

integrity checking
penetration testing

vulnerability scanning

network scanning

When testing the tunnel to verify a site-to-site VPN connection between an ISR and an ASA,
why does an initial ping fail, but subsequent pings succeed?

Select one:

The ASA and ISR must negotiate the tunnel parameters.

The ISR has an incorrect configuration.

The first ping is not considered interesting traffic.

The connection was not successful.

What is the most trustworthy security level that can be configured on an ASA device interface?

Select one:

100

50

255

What type of security test uses simulated attacks to determine possible consequences of a real
threat?

Select one:

vulnerability scanning

penetration testing

network scanning

integrity checking

In the prosecution of an individual, what answers the question of why the individual committed
an illegal act?

Select one:

opportunity
complexity

motive

means

What step must be taken before investigators can determine if data tampering has occurred?

Select one:

Flush the system memory.

Reboot the machine.

Create a drive image of the original hard drive.

Photograph the equipment that is involved.

How is success measured in the implementation of a security awareness program throughout a


large organization?

Select one:

a reduction of unauthorized actions by insiders

a noticeable increase in attendance at educational programs

a reduction of logged attacks by outsiders

a noticeable increase in the access and use of procedure documents

What is the purpose of configuring an IP address on an ASA device in transparent mode?

Select one:

routing

NAT

VPN connectivity

management

Which three detailed documents are used by security staff for an organization to implement the
security policies? (Choose three.)

Select one or more:

standards
procedures

risk assessment

best practices

asset inventory

guidelines

By default, which type of certificate is used by an ASA 5505 for client authentication?

Select one:

third-party certificate

purchased certificate

No certificates are used by default. The type must be specified.

self-signed certificate

When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered in the
Peer Device Identification window?

Select one:

the IP address of the peer

the MAC address of the outbound interface

the IP address of the outbound interface

the MAC address of the peer

Which network security tool can detect open TCP and UDP ports on most versions of Microsoft
Windows?

Select one:

SuperScan

Nmap

L0phtcrack

Zenmap

What type of security test uses simulated attacks to determine possible consequences of a real
threat?

Select one:

penetration testing

network scanning
vulnerability scanning

integrity checking

Which ASDM wizard would allow a network administrator to configure an ASA for NAT/PAT?

Select one:

VPN wizards

ASDM Identify Certificate Wizard‹

High Availability and Scalability Wizard

Startup Wizard

When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?

Select one:

to create the crypto map

to bind the interface to the ISAKMP policy

to identify the location of the peer

to create the ISAKMP policy

Which executive position is responsible for all IT and computer systems that support enterprise
goals?

Select one:

Chief Security Officer

Chief Executive Officer

Chief Information Officer

Chief Technology Officer

When testing the tunnel to verify a site-to-site VPN connection between an ISR and an ASA,
why does an initial ping fail, but subsequent pings succeed?

Select one:

The first ping is not considered interesting traffic.

The connection was not successful.

The ISR has an incorrect configuration.

The ASA and ISR must negotiate the tunnel parameters.


Refer to the exhibit. A network administrator is configuring PAT on an ASA device to enable
internal workstations to access the Internet. Which configuration command should be used next?

Select one:

nat (inside,outside) dynamic NET1

nat (outside,inside) dynamic interface

nat (inside,outside) dynamic interface

nat (outside,inside) dynamic NET1

Which network security tool can detect open TCP and UDP ports on most versions of Microsoft
Windows?

Select one:

L0phtcrack

Nmap

SuperScan

Zenmap

Which object or object group is required to implement NAT on an ASA 5505 device?

Select one:

service object

protocol object group

network object

network object group

Which type of documents offer suggestions on how to do things more securely within an
organization and contain best practices?

Select one:

end user policies

procedures

standards

guidelines
Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)

Select one or more:

Zone-Based Policy Firewall

intrusion prevention system

VPN concentrator

Cisco Unified Communications (voice and video) security

stateful firewall

content security and control module

Which three detailed documents are used by security staff for an organization to implement the
security policies? (Choose three.)

Select one or more:

procedures

best practices

risk assessment

asset inventory

standards

guidelines

Which type of security policy includes defined rules and procedures for creating and maintaining
password security?

Select one:

end-user policy

governing policy

technical policy

acceptable use policy

What step must be taken before investigators can determine if data tampering has occurred?

Select one:

Photograph the equipment that is involved.

Reboot the machine.

Create a drive image of the original hard drive.


Flush the system memory.

Which solution allows workers to telecommute effectively and securely?

Select one:

remote-access VPN

DSL connection

site-to-site VPN

dial-up connection

True or False?

If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.

Select one:

false

true

What is one benefit of using ASDM to configure a Cisco ASA?

Select one:

It does not require a remote connection to a Cisco device.

It is easier to use.

It does not require any knowledge of networking.

It does not require software setup to begin configuration.

When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?

Select one:

to bind the interface to the ISAKMP policy

to create the ISAKMP policy

to create the crypto map

to identify the location of the peer

What component of a security policy explicitly defines the type of traffic allowed on a network
and what users are allowed and not allowed to do?

Select one:
acceptable use policies

remote access policies

password policies

identification and authentication policies

When testing the tunnel to verify a site-to-site VPN connection between an ISR and an ASA,
why does an initial ping fail, but subsequent pings succeed?

Select one:

The connection was not successful.

The first ping is not considered interesting traffic.

The ASA and ISR must negotiate the tunnel parameters.

The ISR has an incorrect configuration.


Refer to the exhibit. Which ASDM Device Management item would be used to configure a banner
message on the ASA?

Select one:

System Image/Configuration

Licensing

Advanced
Management Access

True or False?

The effectiveness of an operations security solution can only be tested once a real threat occurs.

Select one:

true

false

True or False?

Cisco AnyConnect Secure Mobility Client can be configured to automatically create a VPN
connection that remains up until the user logs out or the session timer expires.

Select one:

true

false

Where is the Cisco AnyConnect client image found on the Cisco ASA?

Select one:

ROM

TFTP server

flash

RAM

What step must be taken before investigators can determine if data tampering has occurred?

Select one:

Create a drive image of the original hard drive.

Reboot the machine.

Photograph the equipment that is involved.

Flush the system memory.

Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)

Select one or more:

stateful firewall

intrusion prevention system


content security and control module

Zone-Based Policy Firewall

Cisco Unified Communications (voice and video) security

VPN concentrator

Refer to the exhibit. A network administrator is verifying the security configuration of an ASA.
Which command produces the exhibited output?

Select one:

show switch vlan

show interface ip brief

show ip interface brief

show vlan

Which statement is true about ASA CLI and IOS CLI commands?

Select one:

The show ip interface brief command is valid for both CLIs.‹

The ASA CLI does not recognize the write erase command, but the IOS CLI does.

Only the ASA CLI requires the use of Ctrl-C to interrupt show commands.

Both CLIs recognize the Tab key to complete a partial command.

Where is the Cisco AnyConnect client image found on the Cisco ASA?

Select one:
RAM

flash

TFTP server

ROM

How is success measured in the implementation of a security awareness program throughout a


large organization?

Select one:

a noticeable increase in attendance at educational programs

a reduction of unauthorized actions by insiders

a noticeable increase in the access and use of procedure documents

a reduction of logged attacks by outsiders

What component of a security policy explicitly defines the type of traffic allowed on a network
and what users are allowed and not allowed to do?

Select one:

remote access policies

acceptable use policies

identification and authentication policies

password policies

True or False?

If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.

Select one:

true

false

Refer to the exhibit. What kind of NAT is configured on the ASA device?
Select one:

dynamic PAT

dynamic NAT

static NAT

Twice NAT

What network testing tool is used for password auditing and recovery?

Select one:

Metasploit

SuperScan

L0phtcrack

Nessus

Refer to the exhibit. Which Device Setup ASDM menu option would be used to configure the
ASA for the current date?

Select one:
Routing

System Time

Startup Wizard

Interfaces

Device Name/Password

When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered in the
Peer Device Identification window?

Select one:

the MAC address of the peer

the MAC address of the outbound interface

the IP address of the peer

the IP address of the outbound interface

Refer to the exhibit. A network administrator is configuring PAT on an ASA device to enable
internal workstations to access the Internet. Which configuration command should be used next?

Select one:

nat (inside,outside) dynamic NET1

nat (outside,inside) dynamic NET1

nat (outside,inside) dynamic interface

nat (inside,outside) dynamic interface

The ASA device can be configured using either the asdm


or the command-line interface.

True or False?

If the end-user community does not adhere to security policies and procedures, any implemented
network security system can be defeated.

Select one:
false

true

Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)

Select one or more:

VPN concentrator

stateful firewall

content security and control module

Cisco Unified Communications (voice and video) security

Zone-Based Policy Firewall

intrusion prevention system


What is the most trustworthy security level that can be configured on an ASA device interface?

Select one:

50

100

255

Which ASDM wizard would allow a network administrator to configure an ASA for NAT/PAT?

Select one:

VPN wizards

ASDM Identify Certificate Wizard‹

Startup Wizard

High Availability and Scalability Wizard

True or False?

Cisco AnyConnect Secure Mobility Client can be configured to automatically create a VPN
connection that remains up until the user logs out or the session timer expires.

Select one:

true
false

What are the two methods that can be used to start the Cisco ASDM? (Choose two.)

Select one or more:

Run Cisco ASDM as a local service.

Run Cisco ASDM as a local application.

Run Cisco ASDM as a flash application.

Run Cisco ASDM as a Java Web Start application.

Run Cisco ASDM as a local startup application.

In the prosecution of an individual, what answers the question of why the individual committed an
illegal act?

Select one:

motive

means

complexity

opportunity
Which object or object group is required to implement NAT on an ASA 5505 device?

Select one:

protocol object group

network object group

service object

network object

Which three detailed documents are used by security staff for an organization to implement the
security policies? (Choose three.)

Select one or more:


risk assessment
guidelines
best practices
standards
procedures
asset inventory
Refer to the exhibit. What kind of NAT is configured on the ASA device?

Select one:
Twice NAT
static NAT
dynamic NAT
dynamic PAT

True or False?

If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.

Select one:

true

false
Refer to the exhibit. A network administrator is configuring AAA implementation on an ASA
device. What does the option link3 indicate?

Select one:

the network name where the AAA server resides

the sequence of servers in the AAA server group

the specific AAA server name

the interface name

What is the purpose of configuring an IP address on an ASA device in transparent mode?

Select one:

routing

NAT

management

VPN connectivity
How is success measured in the implementation of a security awareness program throughout a
large organization?

Select one:

a reduction of unauthorized actions by insiders

a noticeable increase in attendance at educational programs

a noticeable increase in the access and use of procedure documents

a reduction of logged attacks by outsiders

Which object or object group is required to implement NAT on an ASA 5505 device?

Select one:

service object

protocol object group

network object

network object group

Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)

Select one or more:

Zone-Based Policy Firewall

content security and control module

stateful firewall

Cisco Unified Communications (voice and video) security

VPN concentrator

intrusion prevention system

What step must be taken before investigators can determine if data tampering has occurred?

Select one:

Flush the system memory.

Photograph the equipment that is involved.

Create a drive image of the original hard drive.


Reboot the machine.

Which solution allows workers to telecommute effectively and securely?

Select one:

site-to-site VPN

DSL connection

remote-access VPN

dial-up connection

What type of network security test can detect and report changes made to network systems?

Select one:

integrity checking

Refer to the exhibit. Which three sets of configuration commands were entered on the ASA
5505? (Choose three.)

interface vlan 2

nameif outside

security-level 0

ip address 209.165.200.226 255.255.255.248

route outside 0.0.0.0 0.0.0.0 209.165.200.225

interface e0/0

switchport access vlan 2

no shut

exit

Refer to the exhibit. A network administrator is configuring AAA implementation on an ASA


device. What does the option link3 indicate?

Select one:

the interface name

the specific AAA server name


the network name where the AAA server resides

the sequence of servers in the AAA server group

What type of network security test can detect and report changes made to network systems?

Select one:

network scanning

penetration testing

vulnerability scanning

integrity checking

Which ASDM wizard would allow a network administrator to configure an ASA for NAT/PAT?

Select one:

High Availability and Scalability Wizard

ASDM Identify Certificate Wizard‹

Startup Wizard

VPN wizards

When testing the tunnel to verify a site-to-site VPN connection between an ISR and an ASA,
why does an initial ping fail, but subsequent pings succeed?

Select one:

The ASA and ISR must negotiate the tunnel parameters.

The ISR has an incorrect configuration.

The first ping is not considered interesting traffic.

The connection was not successful.

By default, which type of certificate is used by an ASA 5505 for client authentication?

Select one:

third-party certificate

purchased certificate
No certificates are used by default. The type must be specified.

self-signed certificate

When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?

Select one:

to create the ISAKMP policy

to bind the interface to the ISAKMP policy

to create the crypto map

to identify the location of the peer

Refer to the exhibit. A network administrator is verifying the security configuration of an ASA.
Which command produces the exhibited output?

Select one:

show vlan

show interface ip brief

show ip interface brief

show switch vlan

Refer to the exhibit. Which ASDM Device Management item would be used to configure a banner
message on the ASA?

Select one:

Advanced

Management Access

Licensing

System Image/Configuration
Refer to the exhibit. Which ASDM Device Management item would be used to configure a banner
message on the ASA?

Select one:

Licensing

System Image/Configuration

Advanced

Management Access

What is one benefit of using ASDM to configure a Cisco ASA?

Select one:

It does not require software setup to begin configuration.

It is easier to use.

It does not require any knowledge of networking.

It does not require a remote connection to a Cisco device.

When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?

Select one:

to identify the location of the peer

to create the ISAKMP policy

to create the crypto map

to bind the interface to the ISAKMP policy

True or False?

Cisco AnyConnect Secure Mobility Client can be configured to automatically create a


VPN connection that remains up until the user logs out or the session timer expires.

Select one:

false
true

What two features must match between ASA devices to implement a failover configuration?
(Choose two.)

Select one or more:

amount of RAM

software configuration

source IP address

next-hop destination

device model

When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered in the
Peer Device Identification window?

Select one:

the IP address of the peer

What is one benefit of using ASDM to configure a Cisco ASA?

Select one:

It does not require any knowledge of networking.

It does not require software setup to begin configuration.

It does not require a remote connection to a Cisco device.

It is easier to use.

Which network security tool can detect open TCP and UDP ports on most versions of Microsoft
Windows?

Select one:

Nmap
The ASA device can be configured using either the ASDM or the command-line interface.
Refer to the exhibit. A network administrator is configuring AAA implementation on an ASA
device. What does the option link3 indicate?

Select one:

the interface name

Which type of security policy includes defined rules and procedures for creating and maintaining
password security?

Select one:

governing policy

acceptable use policy

end-user policy

technical policy

If an AAA authentication server is not available, then the local database is used for
authentication.

What network testing tool is used for password auditing and recovery?

Select one:

L0phtcrack

Nessus

SuperScan

Metasploit
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?

Select one:

to bind the interface to the ISAKMP policy

to create the ISAKMP policy

to create the crypto map

to identify the location of the peer


ciscoasa(config)# access-list OUT-TO-IN extended permit protocol 198.133.219.32
255.255.255.224 host 209.165.200.242

What two options can be used for the keyword protocol? (Choose two.)

Select one or more:


ICMP
protocol object-group

Which solution allows workers to telecommute effectively and securely?

Select one:

remote-access VPN

Where is an IP address configured on an ASA 5505 device?

Select one:

VTY lines

physical Layer2 interface

SVI interface

physical Layer 3 interface

True or False?
Cisco AnyConnect Secure Mobility Client can be configured to automatically create a
VPN connection that remains up until the user logs out or the session timer expires.

Select one:

true

false

What is the most trustworthy security level that can be configured on an ASA device
interface?

Select one:

50
255

100

Refer to the exhibit. Which Device Setup ASDM menu option would be used to configure
the ASA for the current date?

Select one:

Device Name/Password

Interfaces

System Time

Routing

Startup Wizard

Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)

Select one or more:

Cisco Unified Communications (voice and video) security

content security and control module

VPN concentrator

stateful firewall

intrusion prevention system

Zone-Based Policy Firewall

When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered
in the Peer Device Identification window?

Select one:

the MAC address of the peer

the IP address of the peer

the MAC address of the outbound interface

the IP address of the outbound interface


Refer to the exhibit. A network administrator is configuring AAA implementation on an
ASA device. What does the option link3 indicate?

Select one:

the specific AAA server name

the interface name

the sequence of servers in the AAA server group

the network name where the AAA server resides

What type of security test uses simulated attacks to determine possible consequences of
a real threat?

Select one:

integrity checking

penetration testing

network scanning

vulnerability scanning

What is the most trustworthy security level that can be configured on an ASA device
interface?

Select one:

255

50

100

Refer to the exhibit. A network administrator is verifying the security configuration of an


ASA. Which command produces the exhibited output?

Select one:

show vlan

show ip interface brief

show switch vlan

show interface ip brief


Fill in the blank.
The Device Management ASDM configuration option can be used to configure
management access, users and AAA access, DHCP, and a master: passphrase

The ASA device can be configured using either the ASDM or the command-line interface.

Which object or object group is required to implement NAT on an ASA 5505 device?

Select one:

protocol object group

network object

network object group

service object

True or False?
If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.

Select one:

true

false

Which type of security policy includes defined rules and procedures for creating and
maintaining password security?

Select one:

end-user policy

governing policy

technical policy

acceptable use policy

True or False?
Cisco AnyConnect Secure Mobility Client can be configured to automatically create a
VPN connection that remains up until the user logs out or the session timer expires.

Select one:

true
false

Which ASDM wizard would allow a network administrator to configure an ASA for
NAT/PAT?

Select one:

Startup Wizard

ASDM Identify Certificate Wizard

High Availability and Scalability Wizard

VPN wizards

What is the default group policy name on an ASA 5505 device?

Select one:

DfltGrpPolicy

Dflt Grp Policy

Dflt.Grp.Policy

Dflt-Grp-Policy

When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the
purpose of the crypto map command in interface configuration mode?

Select one:

to bind the interface to the ISAKMP policy

to identify the location of the peer

to create the ISAKMP policy

to create the crypto map

Which network security tool can detect open TCP and UDP ports on most versions of
Microsoft Windows?

Select one:

Nmap

SuperScan
Zenmap

L0phtcrack

What are the two methods that can be used to start the Cisco ASDM? (Choose two.)

Select one or more:

Run Cisco ASDM as a local application.

Run Cisco ASDM as a local service.

Run Cisco ASDM as a flash application.

Run Cisco ASDM as a Java Web Start application.

Run Cisco ASDM as a local startup application.

True or False?
The effectiveness of an operations security solution can only be tested once a real threat
occurs.

Select one:

true

false

Refer to the exhibit. A network administrator is verifying the security configuration of an


ASA. Which command produces the exhibited output?

Select one:

show switch vlan

show vlan

show ip interface brief

show interface ip brief

When testing the tunnel to verify a site-to-site VPN connection between an ISR and an
ASA, why does an initial ping fail, but subsequent pings succeed?

Select one:

The first ping is not considered interesting traffic.


The connection was not successful.

The ASA and ISR must negotiate the tunnel parameters.

The ISR has an incorrect configuration.

What type of security test uses simulated attacks to determine possible consequences of
a real threat?
Select one:

vulnerability scanning

integrity checking

penetration testing

network scanning

By default, which type of certificate is used by an ASA 5505 for client authentication?

Select one:

purchased certificate

No certificates are used by default. The type must be specified.

self-signed certificate

third-party certificate

Which three detailed documents are used by security staff for an organization to
implement the security policies? (Choose three.)

Select one or more:

risk assessment

best practices

asset inventory

standards

procedures

guidelines

Where is an IP address configured on an ASA 5505 device?

Select one:

VTY lines

physical Layer 3 interface


SVI interface

physical Layer2 interface

How is success measured in the implementation of a security awareness program


throughout a large organization?

Select one:

a noticeable increase in the access and use of procedure documents

a noticeable increase in attendance at educational programs

a reduction of logged attacks by outsiders

a reduction of unauthorized actions by insiders

True or False?

The effectiveness of an operations security solution can only be tested once a real threat occurs.

Select one:

false

True or False?
If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.
true

Which statement is true about ASA CLI and IOS CLI commands?

Both CLIs recognize the Tab key to complete a partial command.

How is success measured in the implementation of a security awareness program throughout a


large organization?

Select one:

a reduction of unauthorized actions by insiders


What type of network security test can detect and report changes made to network systems?

Select one:

integrity checking

Which object or object group is required to implement NAT on an ASA 5505 device?

Select one:
network object

Where is the Cisco AnyConnect client image found on the Cisco ASA?

Select one:

RAM

TFTP server

flash

ROM

When testing the tunnel to verify a site-to-site VPN connection between an ISR and an
ASA, why does an initial ping fail, but subsequent pings succeed?

Select one:

The ASA and ISR must negotiate the tunnel parameters.

The connection was not successful.

The first ping is not considered interesting traffic.

The ISR has an incorrect configuration.


Which network security tool can detect open TCP and UDP ports on most versions of
Microsoft Windows?

Select one:

Zenmap

L0phtcrack

SuperScan

Nmap
What network testing tool is used for password auditing and recovery?

Select one:
Metasploit

L0phtcrack

Nessus

SuperScan

True or False?

If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.

Select one:

true

false
Refer to the exhibit. A network administrator is configuring AAA implementation on an
ASA device. What does the option link3 indicate?

Select one:

the interface name

the specific AAA server name

the sequence of servers in the AAA server group

the network name where the AAA server resides

How is success measured in the implementation of a security awareness program


throughout a large organization?

Select one:

a reduction of logged attacks by outsiders

a reduction of unauthorized actions by insiders

a noticeable increase in attendance at educational programs

a noticeable increase in the access and use of procedure documents

In the prosecution of an individual, what answers the question of why the individual
committed an illegal act?

Select one:

complexity

motive

opportunity
means

True or False?

Cisco AnyConnect Secure Mobility Client can be configured to automatically create a


VPN connection that remains up until the user logs out or the session timer expires.

Select one:

true

false

True or False?

The effectiveness of an operations security solution can only be tested once a real threat
occurs.

Select one:

true

false

Which executive position is responsible for all IT and computer systems that support
enterprise goals?

Select one:

Chief Technology Officer

Chief Security Officer

Chief Executive Officer

Chief Information Officer

When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the
purpose of the crypto map command in interface configuration mode?

Select one:

to identify the location of the peer

to create the ISAKMP policy

to create the crypto map


to bind the interface to the ISAKMP policy

What two features must match between ASA devices to implement a failover configuration?
(Choose two.)

Select one or more:

software configuration

amount of RAM

device model

source IP address

next-hop destination

Where is the Cisco AnyConnect client image found on the Cisco ASA?

Select one:

flash

In the prosecution of an individual, what answers the question of why the individual committed
an illegal act?

Select one:

motive

When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered in the
Peer Device Identification window?

Select one

the IP address of the peer

You might also like