Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 500-258
100% Free Download! 100% Pass Guaranteed!
Cisco ASA Express Security
Question No: 21
In which two form factors is PRSM available? (Choose two.)
-
Physical Appliance
-
Microsoft V-Hyper Virtual Appliance
-
VMware Virtual Appliance
-
Citrix XenServer Virtual Appliance
-
Web Services Application
Answer: A,C
Question No: 22
Which component determines the number of required PRMS licenses?
-
AVC seats
-
WSE seats
-
IPS for NGFW modules
-
ASAs
Answer: D
Question No: 23
Which statement best describes application recognition on the Cisco ASA NGFW?
-
Application recognition is based only on signatures that are constantly updated, which are usually released at a monthly cadence.
-
Application recognition is based on signatures, heuristics, and content scanning, which removes the need to tie applications to ports.
-
Application recognition is based on custom signatures based on URL, FQDN, user agent strings in the HTTP stream, and IP addresses and ports.
-
Application recognition is based on PRSM that supports quick filtering capabilities to search for a particular application.
Answer: B
Question No: 24
The Cisco ASA software image has been erased from flash memory. Which two statements about the process to recover the Cisco ASA software image are true? (Choose two.)
-
Access to the ROM monitor mode is required.
-
The Cisco ASA appliance must have connectivity to the TFTP server where the Cisco ASA image is stored through the Management 0/0 interface.
-
The copy tftp flash command is necessary to start the TFTP file transfer.
-
The server command is necessary to set the TFTP server IP address.
-
Cisco ASA password recovery must be enabled.
Answer: A,D
Question No: 25
Refer to the exhibit.
A new NOC engineer, while viewing a real-time log from an SSL VPN tunnel, has a question about a line in the log.
The IP address 172.26.26.30 is attached to which interface in the network?
-
the Cisco ASA physical interface
-
the physical interface of the end user
-
the Cisco ASA SSL VPN tunnel interface
-
the SSL VPN tunnel interface of the end user
Answer: B
Question No: 26
Refer to the exhibit.
When the user quot;contractorquot; Cisco AnyConnect tunnel is established, what type of Cisco ASA user restrictions are applied to the tunnel?
-
full restrictions (no Cisco ASDM, no CLI, no console access)
-
full restrictions (no read, no write, no execute permissions)
-
full restrictions (CLI show commands and Cisco ASDM monitoring permissions only)
-
full access with no restrictions
Answer: D
Question No: 27
How is the NGFW AVC subscription licensed?
-
term
-
seat
-
application
-
session
Answer: A
Question No: 28
Refer to the exhibit.
After a remote user established a Cisco AnyConnect session from a wireless card through the Cisco ASA appliance of a partner to a remote server, the user opened the Cisco AnyConnect VPN Client Statistics Details screen.
What are the two sources of the IP addresses that are marked A and B? (Choose two.)
-
IP address that is assigned to the wireless Ethernet adapter of the remote user
-
IP address that is assigned to the remote user from the Cisco ASA address pool
-
IP address of the Cisco ASA physical interface of the partner
-
IP address of the Cisco ASA virtual HTTP server of the partner
-
IP address of the default gateway router of the remote user
-
IP address of the default gateway router of the partner
Answer: B,C
Question No: 29
Your IT department needs to run a custom-built TCP application within the clientless SSL
VPN tunnel. The network administrator suggests running the smart tunnel application. Which three statements concerning smart tunnel applications are true? (Choose three.)
-
They support active FTP and other RTSP-based applications.
-
They do not require administrator privileges on the remote system.
-
They require the enabling of port forwarding.
-
They are supported on Windows and MAC OS X platforms.
-
They support native client applications over SSL VPN.
-
They require the modification of the Host file on the end-user PC.
Answer: B,D,E
Question No: 30
Which option is the typical web reputation range for sites that tend to be well managed, responsible content syndication networks, and user-generated content sites?
A. -10 to -6
-
-6 to -3
-
-3 to 3
-
0 to 5
-
5 to 10
Answer: C