Q1. What is the lowest combination of ASA model and license providing 1 Gigabit Ethernet interfaces? 

A. ASA 5505 with failover license option 

B. ASA 5510 Security+ license option 

C. ASA 5520 with any license option 

D. ASA 5540 with AnyConnect Essentials License option 

Answer:


Q2. According to the logging configuration on the Cisco ASA, what will happen if syslog server 10.10.2.40 fails? 

A. New connections through the ASA will be blocked and debug system logs will be sent to the internal buffer. 

B. New connections through the ASA will be blocked and informational system logs will be sent to the internal buffer. 

C. New connections through the ASA will be blocked and system logs will be sent to server 10.10.2.41. 

D. New connections through the ASA will be allowed and system logs will be sent to server 10.10.2.41. 

E. New connections through the ASA will be allowed and informational system logs will be sent to the internal buffer. 

F. New connections through the ASA will be allowed and debug system logs will be sent to the internal buffer. 

Answer:

Explanation: 

This is shown by the following screen shot: 

\psfHomeDesktopScreen Shot 2015-06-17 at 5.26.32 PM.png 


Q3. Which command displays syslog messages on the Cisco ASA console as they occur? 

A. Console logging <level> 

B. Logging console <level> 

C. Logging trap <level> 

D. Terminal monitor 

E. Logging monitor <level> 

Answer:


Q4. CORRECT TEXT 

You are the network security engineer for the Secure-X network. The company has recently detected Increase of traffic to malware Infected destinations. The Chief Security Officer deduced that some PCs in the internal networks are infected with malware and communicate with malware infected destinations. 

The CSO has tasked you with enable Botnet traffic filter on the Cisco ASA to detect and deny further connection attempts from infected PCs to malware destinations. You are also required to test your configurations by initiating connections through the Cisco ASA and then display and observe the Real-Time Log Viewer in ASDM. 

To successfully complete this activity, you must perform the following tasks: 

* Download the dynamic database and enable use of it. 

. Enable the ASA to download of the dynamic database 

. Enable the ASA to download of the dynamic database. 

. Enable DNS snooping for existing DNS inspection service policy rules.. 

. Enable Botnet Traffic Filter classification on the outside interface for All Traffic. 

. Configure the Botnet Traffic Filter to drop blacklisted traffic on the outside interface. Use the default Threat Level settings 

NOTE: The database files are stored in running memory; they are not stored in flash memory. 

NOTE: DNS is enabled on the inside interface and set to the HQ-SRV (10.10.3.20). 

NOTE: Not all ASDM screens are active for this exercise. 

. Verify that the ASA indeed drops traffic to blacklisted destinations by doing the following: 

. From the Employee PC, navigate to http://www.google.com to make sure that access to the Internet is working. 

. From the Employee PC, navigate to http://bot-sparta.no-ip.org. This destination is classified as malware destination by the Cisco SIO database. 

. From the Employee PC, navigate to http://superzarabotok-gid.ru/. This destination is classified as malware destination by the Cisco SIO database. 

. From Admin PC, launch ASDM to display and observe the Real-Time Log Viewer. 

You have completed this exercise when you have configured and successfully tested Botnet traffic filter on the Cisco ASA. 

Answer: See the explanation for detailed answer to this sim question. 


Q5. What are the three types of private VLAN ports? (Choose three.) 

A. promiscuous 

B. isolated 

C. community 

D. primary 

E. secondary 

F. trunk 

Answer: A,B,C 


Q6. Which action is considered a best practice for the Cisco ASA firewall? 

A. Use threat detection to determine attacks 

B. Disable the enable password 

C. Disable console logging D. Enable ICMP permit to monitor the Cisco ASA interfaces 

E. Enable logging debug-trace to send debugs to the syslog server 

Answer:


Q7. You are a security engineer at a large multinational retailer. Your Chief Information Officer recently attended a security conference and has asked you to secure the network infrastructure from VLAN hopping. 

Which statement describes how VLAN hopping can be avoided? 

A. There is no such thing as VLAN hopping because VLANs are completely isolated. 

B. VLAN hopping can be avoided by using IEEE 802.1X to dynamically assign the access VLAN to all endpoints and setting the default access VLAN to an unused VLAN ID. 

C. VLAN hopping is avoided by configuring the native (untagged) VLAN on both sides of an ISL trunk to an unused VLAN ID. 

D. VLAN hopping is avoided by configuring the native (untagged) VLAN on both sides of an IEEE 802.1Q trunk to an unused VLAN ID. 

Answer:


Q8. What are two reasons to implement Cisco IOS MPLS Bandwidth-Assured Layer 2 Services? (Choose two.) 

A. guaranteed bandwidth and peak rates as well as low cycle periods, regardless of which systems access the device 

B. increased resiliency through MPLS FRR for AToM circuits and better bandwidth utilization through MPLS TE 

C. enabled services over an IP/MPLS infrastructure, for enhanced MPLS Layer 2 functionality 

D. provided complete proactive protection against frame and device spoofing 

Answer: B,C 


Q9. Which option is the Cisco ASA on-box graphical management solution? 

A. SSH 

B. ASDM 

C. Console 

D. CSM 

Answer:


Q10. In a Cisco ASAv failover deployment, which interface is preconfigured as the failover interface? 

A. GigabitEthernet0/2 

B. GigabitEthernet0/4 

C. GigabitEthernet0/6 

D. GigabitEthernet0/8 

Answer: