1.
A private wan connection is suspected of intermittently corrupting data. Which technology can a network administrator use to detect and drop the altered data traffic?
2.
A company needs to provide secure access to its remote workforce. The end users use public kiosk computers and a wide range of devices. They will be accessing only an internal web application. Which VPN solution satisfies these requirements?
3.
Which statement is true when implementing a router with a dynamic public IP address in a crypto map based site-to-site VPN?
4.
Which technology can rate-limit the number of tunnels on a DMVPN hub when system utilization is above a specified percentage?
5.
Using the default modular policy framework global configuration on the Cisco ASA, how does the Cisco ASA process outbound HTTP traffic?
6.
Which flags should the show conn command normally show after a TCP connection has successfully been established from an inside host to an outside host?
7.
Which Cisco ASA show command groups the xlates and connections information together in its output?
8.
When a Cisco ASA is configured in multiple context mode, within which configuration are the interfaces allocated to the security contexts?
9.
When troubleshooting redundant interface operations on the Cisco ASA, which configuration should be verified?
10.
Which statement about the Cisco ASA 5505 configuration is true?