[单选题]25. A user is complaining of being unable to open external or internal URLs directly or from the boo
[多选题]20. When troubleshooting an SSL tunnel establishment attempt, which two ASDM locations can you use t
[多选题]21. Which configuration command is used in the CLI to create a new RSA key pair?可以使用CLI 的哪个配置命令生成一个新
[多选题]22. When configuring RSA key pairs, which modulus values are available on the ASA device? (Choose al
[单选题]23. Which is the default authentication scheme used by the DefaultWEBVPNGroup connection profile? De
[单选题]18. Which ASDM location is used to import an identity certificate?在ASDM的什么位置可以导入 一个身份证书?
[单选题]19. When creating a new DNS group, what is the maximum number of DNS servers that you can add?当建立一个新
[多选题]16. Which two of the following are required when creating a CSR for an identity certificate?当 为一个身份证
[单选题]17. What file is required for the operation of the ASA Application Helper? ASA的Application Helper的操作
[多选题]14. Which of the following are valid group policy types?下面的哪一个是有效的组策略类型?
[多选题]15. When configuring external group polices, which AAA protocols or servers can you use for authoriz
[多选题]12. Which two of the following are the default connection profiles that exist on the ASA device? ASA
[多选题]13. Which of the following obejcts can be used for post-login policy assignment?下面的哪个对象可以用于登录后策略分配?(
[多选题]6. What is the key size used by the DES encryption protocol?下面哪个是被DES加密协议所使用的密钥尺寸?
[多选题]7. What are the two IKE methods used by the IPsec protocol for secure tunnel negotiation? (Choose al
[多选题]8. Which of the following is not a valid packet-processing action taken by the ASA for flows traveli
[多选题]9. Which of the following is the recommended tool for viewing the path a packet takes through the AS
[多选题]10. Which of the following are available methods of assigninga connection profile? (Choose all that
[多选题]11. Which of the following policy types take precedence over all others configured based on the ASA
[多选题]4. Which of the following are valid characterizations of key encryption protocols? (Choose all that
[多选题]5. Which of the following would be considered a valid type of VPN? (Choose all that apply.)下 面哪些被认为是
[多选题]3. Which of the following are valid encryption protocols? (Choose all that apply.)下面哪些是有效的加密协议?(选出所有
[多选题]4. Which of the following are valid characterizations of key encryption protocols? (Choose all that
[多选题]1. Which of the following are available VPN connection methods on the ASA? (Choose all that apply.)下
[多选题]2. Which of the following are processes achieved by secure VPNs? (Choose all that apply.)下面 哪些是一个安全的