Net Auth Exam 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the most trustworthy security level that can be configured on an ASA device interface? 0 50 100 255

100

Which IPsec framework protocol provides data integrity and data authentication, but does not provide data confidentiality? AH IP protocol 50 ESP DH

AH

Which statement is true about ASA CLI and IOS CLI commands? Both CLIs recognize the Tab key to complete a partial command. Only the ASA CLI requires the use of Ctrl-C to interrupt�show�commands. The�show ip interface brief�command is valid for both CLIs.? The ASA CLI does not recognize the�write erase�command, but the IOS CLI does.

Both CLIs recognize the Tab key to complete a partial command.

What is the default group policy name on an ASA 5505 device? Dflt.Grp.Policy Dflt-Grp-Policy Dflt Grp Policy DfltGrpPolicy

DfltGrpPolicy

Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols? OSPF IPsec IKE GRE PPP

GRE

Which are the five security associations to configure in ISAKMP policy configuration mode? Hash, Authentication, Group, Lifetime, Encryption Hash, Authentication, GRE, Lifetime, ESP Hash, Authorization, Group, Lifetime, Encryption Hash, Accounting, Group, Lifetime, ESP

Hash, Authentication, Group, Lifetime, Encryption

During which part of establishing an IPsec VPN tunnel between two sites would NAT-T detection occur? IKE Phase 1 IKE Phase 2 ISAKMP Phase 1 ISAKMP Phase 2 IKE&NIXON 56 IKE Phase 12

IKE Phase 1

What takes place during IKE Phase 2 when establishing an IPsec VPN? IPsec security associations are exchanged. Traffic is exchanged between IPsec peers. ISAKMP security associations are exchanged. Interesting traffic is identified.

IPsec security associations are exchanged.

Which statement describes the operation of the IKE protocol? It uses IPsec to establish the key exchange process. It uses sophisticated hashing algorithms to transmit keys directly across a network. It calculates shared keys based on the exchange of a series of data packets. It uses TCP port 50 to exchange IKE information between the security gateways.

It calculates shared keys based on the exchange of a series of data packets.

What is one benefit of using ASDM to configure a Cisco ASA? It is easier to use. It does not require software setup to begin configuration. It does not require any knowledge of networking. It does not require a remote connection to a Cisco device.

It is easier to use

Which Cisco secure access solution can be used to determine if hosts are compliant with security policies? Network Admission Control Appliance Cisco Secure Access Control System Cisco AnyConnect Secure Mobility Solutions Cisco Adaptive Wireless IPS Software

Network Admission Control Appliance

What are the two methods that can be used to start the Cisco ASDM? (Choose two.) Run Cisco ASDM as a local service. Run Cisco ASDM as a flash application. Run Cisco ASDM as a local application.? Run Cisco ASDM as a local startup application.? Run Cisco ASDM as a Java Web Start application.?

Run Cisco ASDM as a local application.? Run Cisco ASDM as a Java Web Start application.?

What protocol is used by SCP for secure transport? IPSec HTTPS SSH Telnet TFTP

SSH

Where is an IP address configured on an ASA 5505 device? SVI interface physical Layer 3 interface physical Layer2 interface VTY lines

SVI interface

Which ASDM wizard would allow a network administrator to configure an ASA for NAT/PAT? ASDM Identify Certificate Wizard? High Availability and Scalability Wizard Startup Wizard VPN wizards

Startup Wizard

When testing the tunnel to verify a site-to-site VPN connection between an ISR and an ASA, why does an initial ping fail, but subsequent pings succeed? The connection was not successful. The first ping is not considered interesting traffic. The ASA�and ISR must negotiate the tunnel parameters. The ISR has an incorrect configuration.

The ASA�and ISR must negotiate the tunnel parameters.

What are three characteristics of ASA transparent mode? (Choose three.) This mode does not support VPNs, QoS, or DHCP Relay. The interfaces of the ASA separate Layer 3 networks and require IP addresses in different subnets. It is the traditional firewall deployment mode. NAT can be implemented between connected networks. This mode is referred to as a "bump in the wire." In this mode the ASA is invisible to an attacker.

This mode does not support VPNs, QoS, or DHCP Relay. This mode is referred to as a "bump in the wire." In this mode the ASA is invisible to an attacker.

What are the two examples of minimum configurations that are required on an ASA 5505 before ASDM can be used? (Choose two.) SSH AAA authentication and authorization Ethernet 0/0 a logical VLAN interface and an Ethernet port other than 0/0 a dedicated Layer 3 management interface

a logical VLAN interface and an Ethernet port other than 0/0 a dedicated Layer 3 management interface

Which method is used to identify interesting traffic needed to create an IKE phase a permit access list entry a security association transform sets hashing algorithms

a permit access list entry

What are the two major components of a security awareness program? (Choose two.) awareness campaign security policy development security solution development self-defending network implementation training and education

awareness campaign training and education

The use of 3DES within the IPsec framework is an example of which of the five IPsec building blocks? authentication confidentiality Diffie-Hellman integrity nonrepudiation

confidentiality

What is the first step in establishing an IPsec VPN? detection of interesting traffic negotiation of ISAKMP policies creation of a secure tunnel to negotiate a security association policy creation of an IPsec tunnel between two IPsec peers

detection of interesting traffic

What two features must match between ASA devices to implement a failover configuration? (Choose two.)? source IP address device model amount of RAM next-hop destination software configuration

device model amount of RAM

Where is the Cisco AnyConnect client image found on the Cisco ASA? RAM ROM TFTP�server flash

flash

Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit? confidentiality integrity authentication secure key exchange

integrity

Which three security features do ASA models 5505 and 5510 support by default? (Choose three.) content security and control module Cisco Unified Communications (voice and video) security intrusion prevention system stateful firewall VPN concentrator Zone-Based Policy Firewall

intrusion prevention system stateful firewall VPN concentrator

What is the purpose of configuring an IP address on an ASA device in transparent mode? management NAT VPN connectivity routing

management

Which object or object group is required to implement NAT on an ASA 5505 device? network object group network object service object protocol object group

network object

Which solution allows workers to telecommute effectively and securely? site-to-site VPN remote-access VPN dial-up connection DSL connection

remote-access VPN

What is a benefit of having users or remote employees use a VPN to connect to the existing network rather than growing the network infrastructure? security scalability cost savings compatibility

scalability

By default, which type of certificate is used by an ASA 5505 for client authentication? purchased certificate self-signed certificate third-party certificate No certificates are used by default. The type must be specified.

self-signed certificate

Which VPN implementation allows traffic that originates from a remote-access client to be separated into trusted VPN traffic and untrusted traffic destined for the public hairpinning split tunneling GRE MPL

split tunneling

When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered in the Peer Device Identification window?' the IP address of the outbound interface the MAC address of the outbound interface the IP address of the peer the MAC address of the peer

the IP address of the peer

What is defined by an ISAKMP policy the security associations that IPsec peers are willing to use the preshared keys that will be exchanged between IPsec peers access lists that identify interesting traffic the IP addresses of IPsec peers

the security associations that IPsec peers are willing to use

When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose of the�crypto map�command in interface configuration mode? to bind the interface to the ISAKMP policy to create the crypto map to identify the location of the peer to create the ISAKMP policy

to bind the interface to the ISAKMP policy


Set pelajaran terkait

Rn online resource - Pregnancy-Induced Hypertension

View Set

BECN Money, Banking, Finance (Ch.10.2 & 10.4) Ch. 13 5th Ed.

View Set

Anatomy & Physiology Test from AMA

View Set