1.
Which Cisco ASDM 6.4.1 pane is used to enable the Cisco ASA appliance to perform TCP checksum verifications?
2.
Which five options are valid logging destinations for the Cisco ASA? (Choose five.)
3.
On Cisco ASA Software Version 8.4.1, which four inspections are enabled by default in the global policy? (Choose four.)
4.
Which four unicast or multicast routing protocols are supported by the Cisco ASA appliance? (Choose four.)
5.
On Cisco ASA Software Version 8.4 and later, which two options show the maximum number of active and standby ports that an EtherChannel can have? (Choose two.)
6.
Scenario: To access Cisco ASDM, click the PC icon in the Topology window, ASDM and answer the following question as:
Which statement about the Cisco ASA configuration is true?
7.
Scenario: To access Cisco ASDM, click the PC icon in the Topology window, ASDM and answer the following question as:
The Cisco ASA administration must enable the Cisco ASA to automatically drop suspicious botnet traffic. After the Cisco ASA administrator entered the initial configuration, the Cisco ASA is not automatically dropping the suspicious botnet traffic. What else must be enabled in order to make it work?
8.
When the Cisco ASA detects scanning attacks, how long is the attacker who is performing the scan shunned?
9.
By default, which access rule is applied inbound to the inside interface?
10.
Which Cisco ASA platform should be selected if the requirements are to support 35,000 connections per second, 600,000 maximum connections, and traffic shaping?