1.
In Cisco IDM, the Configuration > Sensor Setup > SSH > Known Host Keys screen is used for what purpose?
2.
Which configuration is required when setting up the initial configuration on the Cisco ASA 5505 to support the Cisco ASA AIP-SSC?
3.
The Cisco IPS appliance risk category is used with which other feature?
4.
You are working with Cisco TAC to troubleshoot a software problem on the Cisco IPS appliance. TAC suspects a fault with the ARC software module in the Cisco IPS appliance. In this case, which Cisco IPS appliance operations may be most affected by the ARC software module fault?
5.
Threat rating calculation is performed based on which factors?
6.
Which technology can provide high availability for an SSL VPN?
7.
Which technology must be installed on the client computer to enable users to launch applications from a Clientless SSL VPN?
8.
In the Diffie-Hellman protocol, which type of key is the shared secret?
9.
Which protocol does DTLS use for its transport?
10.
Scenario: You are the senior network security administrator for your organization. Recently and junior engineer configured a site-to-site IPsec VPN connection between your headquarters Cisco ASA and a remote branch office.
You are now tasked with verifying the IKEvl IPsec installation to ensure it was properly configured according to designated parameters. Using the CLI on both the Cisco ASA and branch ISR. verify the IPsec configuration is properly configured between the two sites.
NOTE: the show running-config command cannot be used for the this exercise.
Topology:
What is being used as the authentication method on the branch ISR?