<< Prev Question Next Question >>

Question 45/189

By default, not all services in the default inspection class are inspected. Which Cisco ASA CLI command do you use to determine which inspect actions are applied to the default inspection class?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (189q)
Question 1: Which ASA feature is used to keep track of suspected attacke...
Question 2: Enabling what security mechanism can prevent an attacker fro...
Question 3: A network engineer has installed Cisco Security Manager 4.7 ...
Question 4: Which addresses are considered "ambiguous addresses" and are...
Question 5: Which five options are valid logging destinations for the Ci...
Question 6: Which three configurations are needed to enable SNMPv3 suppo...
Question 7: An engineer must implement secure device management on a Cis...
Question 8: (Exhibit) Which statement about how the Cisco ASA supports S...
Question 9: In IOS routers, what configuration can ensure both preventio...
Question 10: Which two voice and video protocols does the Cisco ASA 5500 ...
Question 11: When you configure a Cisco firewall in multiple context mode...
Question 12: An engineer is hardening the management plane for an ASA. Wh...
Question 13: Which feature can suppress packet flooding in a network?...
Question 14: At which layer does MACsec provide encryption?...
Question 15: Which two VPN types can you monitor and control with Cisco P...
Question 16: Which command enables the HTTP server daemon for Cisco ASDM ...
Question 17: At which firewall severity level will debugs appear on a Cis...
Question 18: A Cisco ASA requires an additional feature license to enable...
Question 19: You are the administrator of a multicontext transparent-mode...
Question 20: Which option is the default logging buffer size in memory of...
Question 21: Which three options correctly identify the Cisco ASA1000V Cl...
Question 22: What is a required attribute to configure NTP authentication...
Question 23: Which two TCP ports must be open on the Cisco Security Manag...
Question 24: Which statement about the Cisco ASA configuration is true?...
Question 25: Which characteristic of community ports in a PVLAN is true?...
Question 26: Which two attacks are common at Layer 2? (Choose two)...
Question 27: Which Layer 2 security feature validates ARP packets?...
Question 28: According to Cisco best practices, which two interface confi...
Question 29: What can you do to enable inter-interface firewall communica...
Question 30: What are the three types of private VLAN ports? (Choose thre...
Question 31: What is the default behavior of an access list on a Cisco AS...
Question 32: Which two statements about transparent firewall are true? (C...
Question 33: Which type of object group will allow configuration for both...
Question 34: When configuring security contexts on the Cisco ASA, which t...
Question 35: What is the lowest combination of ASA model and license prov...
Question 36: Which three options are default settings for NTP parameters ...
Question 37: Which statement describes what the arp outside 1.1.1.1 0192....
Question 38: What is the maximum jumbo frame size for IPS standalone appl...
Question 39: Which statement describes a unifeature of cisco netflow secu...
Question 40: Which two features block traffic that is sourced from non-to...
Question 41: Which command change secure HTTP port from 443 to 444?...
Question 42: Which three statements about the software requirements for a...
Question 43: Which command configures the SNMP server group1 to enable au...
Question 44: When configured in accordance to Cisco best practices, the i...
Question 45: By default, not all services in the default inspection class...
Question 46: Which technology can be deployed with a Cisco ASA 1000V to s...
Question 47: Which two features are supported when configuring clustering...
Question 48: What is the primary purpose of stateful pattern recognition ...
Question 49: You are a security engineer at a large multinational retaile...
Question 50: In a Cisco ASAv failover deployment, which interface is prec...
Question 51: Which function does DNSSEC provide in a DNS infrastructure?...
Question 52: How does the DAI work? (Choose two.)...
Question 53: Which three statements about private VLANs are true? (Choose...
Question 54: An engineer is applying best practices to stop VLAN hopping ...
Question 55: If a switch port goes directly into a blocked state only whe...
Question 56: Which statement describes a unique feature of Cisco NetFlow ...
Question 57: It has been reported that an application is not working wher...
Question 58: Refer to the exhibit. Which destination receives an event if...
Question 59: Which Cisco switch technology prevents traffic on a LAN from...
Question 60: Which two options can be used when configuring a packet capt...
Question 61: You are the administrator of a Cisco ASA 9.0 firewall and ha...
Question 62: Which URL matches the regex statement "http"*/"www.cisco.com...
Question 63: Which two options are available with cisco security manager ...
Question 64: A router is being enabled for SSH command line access. The f...
Question 65: The Cisco ASA must support dynamic routing and terminating V...
Question 66: When configuring a new context on a Cisco ASA device, which ...
Question 67: At which layer does Dynamic ARP Inspection validate packets?...
Question 68: A Cisco ASA is configured in multiple context mode and has t...
Question 69: An administrator installed a Cisco ASA that runs version 9.1...
Question 70: Which two configurations are necessary to enable password-le...
Question 71: Which VTP mode supports private VLANs on a switch?...
Question 72: Which information does the ASA fail to replicate to the seco...
Question 73: Where on a firewall does an administrator assign interfaces ...
Question 74: (Exhibit) SNMP users have a specified username, a group to w...
Question 75: Which Cisco ASA command authenticates the Cisco ASDM client ...
Question 76: Which type of traffic would make use of the ASA's default ro...
Question 77: How many interfaces can a Cisco ASA bridge group support and...
Question 78: Refer to the exhibit. (Exhibit) Which command can produce th...
Question 79: Which Cisco ASA show command groups the xlates and connectio...
Question 80: If you encounter problems logging in to the Cisco Security M...
Question 81: Refer to the exhibit. (Exhibit) What is the effect of this f...
Question 82: Refer to the exhibit. (Exhibit) Which two statements about t...
Question 83: Which two configurations are the minimum needed to enable EI...
Question 84: Refer to the exhibit. (Exhibit) Server A is a busy server th...
Question 85: An engineer is trying to configure Dynamic ARP Inspection. W...
Question 86: To which interface on a Cisco ASA 1000V firewall should a se...
Question 87: Which Cisco ASA object group type offers the most flexibilit...
Question 88: Which technology provides forwarding-plane abstraction to su...
Question 89: Which activity is performed by the switch when Dynamic ARP i...
Question 90: (Exhibit) An SNMP host is an IP address to which SNMP notifi...
Question 91: Which two router commands enable NetFlow on an interface? (C...
Question 92: An engineer is applying best practices to step STP unauthori...
Question 93: In the default global policy, which traffic is matched for i...
Question 94: What are two enhancements of SSHv2 over SSHv1? (Choose two.)...
Question 95: Which component does Cisco ASDM require on the host Cisco AS...
Question 96: Which statement about SNMP support on the Cisco ASA applianc...
Question 97: Which command tests authentication with SSH and shows a gene...
Question 98: Private VLANs have been configured in the data center. Which...
Question 99: Which two features does Cisco Security Manager provide? (Cho...
Question 100: When an engineer is configuring DHCP snooping, which configu...
Question 101: To which port does a firewall send secure logging messages?...
Question 102: What are two reasons to implement Cisco IOS MPLS Bandwidth-A...
Question 103: Which statement describes the correct steps to enable Botnet...
Question 104: An attacker has gained physical access to a password protect...
Question 105: You have explicitly added the line deny ipv6 any log to the ...
Question 106: Which two statements about Cisco IDS are true? (Choose two.)...
Question 107: What are two primary purposes of Layer 2 detection in Cisco ...
Question 108: A network engineer must manage and push configurations to a ...
Question 109: Which statement about the Cisco ASA botnet traffic filter is...
Question 110: On a Cisco ASA, how can you allow traffic to enter and exit ...
Question 111: An enterprise has enforced DHCP snooping on the enterprise s...
Question 112: What is a benefit the iOS control plane protection?...
Question 113: Refer to the exhibit. (Exhibit) What is the effect of this c...
Question 114: With the crypto key generate rsa command, how many bits mini...
Question 115: Refer to the exhibit. (Exhibit) Which two statements about t...
Question 116: Which device can be managed by the Cisco Prime Security Mana...
Question 117: If you disable PortFast on switch ports that are connected t...
Question 118: When you set a Cisco IOS Router as an SSH server, which comm...
Question 119: When it is configured in accordance to Cisco best practices,...
Question 120: What are two security features at the access port level that...
Question 121: Which utility can you use to troubleshoot and determine the ...
Question 122: Which two statements about Cisco IOS Firewall are true? (Cho...
Question 123: Refer to the exhibit. Which information is passed between th...
Question 124: A web server has been configured to operate on port 1521. Th...
Question 125: Refer to the exhibit. (Exhibit) A network engineer is testin...
Question 126: When a Cisco ASA is configured in transparent mode, how can ...
Question 127: Refer to the exhibit. (Exhibit) To protect Host A and Host B...
Question 128: Which option is a Cisco best practice when configuring traff...
Question 129: Where in the Cisco ASA appliance CLI are Active/Active Failo...
Question 130: Which four are IPv6 First Hop Security technologies? (Choose...
Question 131: When creating a cluster of Cisco ASA firewalls, which featur...
Question 132: Which hypervisor technology is supported by Cisco ASA 1000V ...
Question 133: A Cisco ASA is configured for TLS proxy. When should the sec...
Question 134: What are two reasons for implementing NIPS at enterprise Int...
Question 135: What mean following command arp outside 10.1.1.1 0009.xxxx.2...
Question 136: On an ASA running version 9.0, which command is used to nest...
Question 137: Enabling what security mechanism can prevent an attacker fro...
Question 138: With Cisco ASA active/standby failover, by default, how many...
Question 139: IPv6 addresses in an organization's network are assigned usi...
Question 140: Which is the minimum RSA crypto key generate for SSH2?...
Question 141: Which statement about Cisco Security Manager form factors is...
Question 142: When troubleshooting redundant interface operations on the C...
Question 143: A security engineer must evaluate Cisco Security Manager. Wh...
Question 144: An engineer is configuring MACsec encryption. Which two comp...
Question 145: Which product can manage licenses, updates, and a single sig...
Question 146: For which purpose is the Cisco ASA CLI command aaa authentic...
Question 147: Which two voice protocols can the Cisco ASA inspect? (Choose...
Question 148: An engineer is examining the configuration of an IOS device ...
Question 149: In which two modes is zone-based firewall high availability ...
Question 150: When you configure a Botnet Traffic Filter on a Cisco firewa...
Question 151: An engineer has been asked to confirm packet process on an A...
Question 152: How much storage is allotted to maintain system, configurati...
Question 153: Which two device types can Cisco Prime Security Manager mana...
Question 154: Which of the following that Cisco engineer must secure a cur...
Question 155: Which statement about Cisco ASA multicast routing support is...
Question 156: Which three Cisco ASA configuration commands are used to ena...
Question 157: An engineer must secure a LAN infrastructure from potential ...
Question 158: Refer to the exhibit. An engineer has configured identify op...
Question 159: Which two statements about zone-based firewalls are true? (C...
Question 160: Which two options are main challenges for public cloud data ...
Question 161: Which statement about traffic zoning in cisco ASA?...
Question 162: What are three ways to add devices in Cisco Prime Infrastruc...
Question 163: Which security operations management best practice should be...
Question 164: What are two high-level task areas in a Cisco Prime Infrastr...
Question 165: Within Cisco Prime Infrastructure, which configuration Archi...
Question 166: On the Cisco ASA, where are the Layer 5-7 policy maps applie...
Question 167: An engineer has configured a unified IPV6/IPV4 ACL to be use...
Question 168: What is the default violation mode that is applied by port s...
Question 169: Which two SNMPv3 features ensure that SNMP packets have been...
Question 170: In which way are management packets classified on a firewall...
Question 171: What are three attributes that can be applied to a user acco...
Question 172: Which kind of Layer 2 attack targets the STP root bridge ele...
Question 173: What is the result of the default ip ssh server authenticate...
Question 174: A rogue device has connected to the network and has become t...
Question 175: What can an administrator do to simultaneously capture and t...
Question 176: Which configuration keyword will configure SNMPv3 with authe...
Question 177: When a Cisco ASA is configured in multiple context mode, wit...
Question 178: Which Cisco Security Manager form factor is recommended for ...
Question 179: When configuring packet-tracer command from CLI, what is the...
Question 180: Which log level provides the most detail on the Cisco Web Se...
Question 181: What are three of the RBAC views within Cisco IOS Software? ...
Question 182: You have installed a web server on a private network. Which ...
Question 183: Which function in the Cisco ADSM ACL Manager pane allows an ...
Question 184: Your company is replacing a high-availability pair of Cisco ...
Question 185: An engineer is configuring Cisco ASA 1000V Cloud Firewall. W...
Question 186: Which Cisco TrustSec role does a Cisco ASA firewall serve wi...
Question 187: How many bridge groups are supported on a firewall that oper...
Question 188: An engineer is configuring control-plane protocol queue thre...
Question 189: Which two data and voice protocols does ASA 5500 support? (C...