1.
If the IKEv2 tunnel were to establish successfully, which encryption algorithm would be used to encrypt traffic?
2.
After implementing the IKEv2 tunnel, it was observed that remote users on the 192.168.33.0/24 network are unable to access the internet. Which of the following can be done to resolve this problem?
3.
When enabling a Cisco ASA to send syslog messages to a syslog server, which syslog level will produce the most messages?
4.
What mechanism is used on the Cisco ASA to map IP addresses to domain names that are contained in the botnet traffic filter dynamic database or local blacklist?
5.
A Cisco ASA requires an additional feature license to enable which feature?
6.
With Cisco ASA active/standby failover, what is needed to enable subsecond failover?
7.
On Cisco ASA Software Version 8.4.1 and later, when you configure the Cisco ASA appliance in transparent firewall mode, which configuration is mandatory?
8.
Which access rule is disabled automatically after the global access list has been defined and applied?
9.
Which option can cause the interactive setup script not to work on a Cisco ASA 5520 appliance running software version 8.4.1?
10.
Which statement about the Cisco ASA 5585-X appliance is true?