1.
Which three configuration options are available when configuring static routes on the Cisco ASA? (Choose three.)
2.
On the Cisco ASA, what is the default access rule if no user-defined access lists are defined on the interfaces?
3.
When the Cisco ASA detects scanning attacks, how long is the attacker who is performing the scan shunned?
4.
The ASA administrator wants to configure Botnet Traffic Filter using the dynamic database but it is not working properly after the initiate configuration has been entered. What other configuration is missing?
5.
On the Cisco ASA, tcp-map can be applied to a traffic class using which MPF CLI configuration command?
6.
On the Cisco ASA, where are the Layer 5-7 policy maps applied?
7.
With Cisco ASA active/active or active/standby stateful failover, which state information or table is not passed between the active and standby Cisco ASA by default?
8.
Which five options are valid logging destinations for the Cisco ASA? (Choose five.)
9.
When troubleshooting redundant interface operations on the Cisco ASA, which configuration should be verified?
10.
What mechanism is used on the Cisco ASA to map IP addresses to domain names that are contained in the botnet traffic filter dynamic database or local blacklist?