1.
Which of the following statements is true regarding the outbreak control feature of AMP for Endpoints? (Select the best answer.)
2.
You want to use ASDM to create an inspection rule that will drop and log SHOUTcast media streams. Which of the following inspection rules should you configure to achieve your goal? (Select the best answer.)
3.
On which of the following screens in ASDM can you enable users to select which connection profile they will use when they establish a clientless SSL VPN connection? (Select the best answer.)
4.
Which of the following can be configured on the General screen of the Add Internal Group Policy dialog box in ASDM when creating a group policy for clientless SSL VPN users? (Select 3 choices.)
5.
Which of the following show clock command output symbols indicates that time reported by the software clock is authoritative but not synchronized with the configured time source? (Select the best answer.)
6.
Which of the following statements are true regarding policies in Cisco Security Manager? (Select 2 choices.)
7.
Which of the following authentication methods are supported by both RADIUS and TACACS+ server groups on a Cisco ASA firewall? (Select 3 choices.)
8.
Which of the following statements is true regarding ZFW traffic action characteristics? (Select the best answer.)
9.
You have configured an ASA to accept SSL VPN connections. DTLS and DPD are configured on the ASA. Which of the following is most likely to occur if a Cisco AnyConnect client that is not configured for DTLS attempts to connect to the ASA? (Select the best answer.)
10.
Which of the following are inband management tools that do not use encryption? (Select 3 choices.)