Q1. A router is being enabled for SSH command line access. The following steps have been taken:
. The vty ports have been configured with transport input SSH and login local.
. Local user accounts have been created.
. The enable password has been configured.
What additional step must be taken if users receive a 'connection refused' error when attempting to access the router via SSH?
A. A RSA keypair must be generated on the router
B. An access list permitting SSH inbound must be configured and applied to the vty ports
C. An access list permitting SSH outbound must be configured and applied to the vty ports
D. SSH v2.0 must be enabled on the router
Answer: A
Q2. Which three statements about the software requirements for a firewall failover configuration are true? (Choose three.)
A. The firewalls must be in the same operating mode.
B. The firewalls must have the same major and minor software version.
C. The firewalls must be in the same context mode.
D. The firewalls must have the same major software version but can have different minor versions.
E. The firewalls can be in different context modes.
F. The firewalls can have different Cisco AnyConnect images.
Answer: A,B,C
Q3. What is the maximum jumbo frame size for IPS standalone appliances with 1G and 10G fixed or add-on interfaces?
A. 1024 bytes
B. 1518 bytes
C. 2156 bytes
D. 9216 bytes
Answer: D
Q4. Which Cisco TrustSec role does a Cisco ASA firewall serve within an identity architecture?
A. Access Requester
B. Policy Decision Point
C. Policy Information Point
D. Policy Administration Point
E. Policy Enforcement Point
Answer: E
Q5. What is the default log level on the Cisco Web Security Appliance?
A. Trace
B. Debug
C. Informational
D. Critical
Answer: C
Q6. Which two options are protocols and tools that are used by the management plane when discussing Cisco ASA general management plane hardening? ( Choose two )
A. Unicast Reverse Path Forwarding
B. NetFlow
C. Routing Protocol Authentication
D. Threat detection
E. Syslog
F. ICMP unreachables
G. Cisco URL Filtering
Answer: B,E
Explanation: http://www.cisco.com/web/about/security/intelligence/firewall-best-practices.html
Q7. Which type of object group will allow configuration for both TCP 80 and TCP 443?
A. service
B. network
C. time range
D. user group
Answer: A
Q8. Which statement about Cisco ASA NetFlow v9 (NSEL) is true?
A. NSEL events match all traffic classes in parallel
B. NSEL is has a time interval locked at 20 seconds and is not user configurable
C. NSEL tracks flow-create, flow-teardown, and flow-denied events and generates appropriate NSEL data records
D. You cannot disable syslog messages that have become redundant because of NSEL
E. NSEL tracks the flow continuously and provides updates every 10 second
F. NSEL provides stateless IP flow tracking that exports all record od a specific flow
Answer: C
Explanation:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/monitor _nsel. Html
Q9. Which three statements about transparent firewall are true? ( Choose three)
A. It does not support any type of VPN.
B. Both interfaces must be configured with private IP addresses.
C. It can have only a management IP address.
D. It does not support dynamic routing protocols.
E. It only supports PAT.
F. Transparent firewall works at Layer 2.
Answer: C,D,F
Q10. Which set of commands enables logging and displays the log buffer on a Cisco ASA?
A. enable logging
show logging
B. logging enable
show logging
C. enable logging int e0/1
view logging
D. logging enable
logging view config
Answer: B
Q11. A Cisco ASA is configured for TLS proxy. When should the security appliance force remote IP phones connecting to the phone proxy through the internet to be in secured mode?
A. When the Cisco Unified Communications Manager cluster is in non-secure mode
B. When the Cisco Unified Communications Manager cluster is in secure mode only
C. When the Cisco Unified Communications Manager is not part of a cluster
D. When the Cisco ASA is configured for IPSec VPN
Answer: A
Q12. Which statement describes the correct steps to enable Botnet Traffic Filtering on a Cisco ASA version 9.0 transparent-mode firewall with an active Botnet Traffic Filtering license?
A. Enable DNS snooping, traffic classification, and actions.
B. Botnet Traffic Filtering is not supported in transparent mode.
C. Enable the use of the dynamic database, enable DNS snooping, traffic classification, and actions.
D. Enable the use of dynamic database, enable traffic classification and actions.
Answer: C
Q13. What are three of the RBAC views within Cisco IOS Software? (Choose three.)
A. Admin
B. CLI
C. Root
D. Super Admin
E. Guest
F. Super
Answer: B,C,F
Q14. What is the result of the default ip ssh server authenticate user command?
A. It enables the public key, keyboard, and password authentication methods. B. It enables the public key authentication method only.
C. It enables the keyboard authentication method only.
D. It enables the password authentication method only.
Answer: A
Q15. You are configuring a Cisco IOS Firewall on a WAN router that is operating as a Trusted Relay Point (TRP) in a voice network. Which feature must you configure to open data-channel pinholes for voice packets that are sourced from a TRP within the WAN?
A. CAC
B. ACL
C. CBAC
D. STUN
Answer: D