CISCO ASA

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jjscarpino4
J
Jjscarpino4
Community Contributor
Quizzes Created: 3 | Total Attempts: 3,456
| Attempts: 1,809 | Questions: 75
Please wait...
Question 1 / 75
0 %
0/100
Score 0/100
1. What is the symbol for the prompt in the CLI that lets you know you are in privileged mode?

Explanation

The symbol "#" is used in the CLI to indicate that the user is in privileged mode. This mode grants the user access to advanced configuration and management commands, allowing them to make changes to the system settings. The "#" symbol is commonly used in various network devices and operating systems, such as Cisco routers and Unix-based systems, to signify privileged mode.

Submit
Please wait...
About This Quiz
CISCO Quizzes & Trivia

This Cisco ASA quiz assesses knowledge on Adaptive Security Appliance fundamentals, including CLI access, default configurations, and system settings. It is designed for learners aiming to enhance their... see moretechnical skills in network security, offering insights into essential ASA operations. see less

2. When dealing with security levels, what is the most secure level?

Explanation

The most secure level when dealing with security levels is 100.

Submit
3. Which one is NOT a way to access the CLI?

Explanation

RDP (Remote Desktop Protocol) is not a way to access the Command Line Interface (CLI). RDP is a proprietary protocol developed by Microsoft that allows users to remotely connect to and control a computer over a network. It provides a graphical interface rather than a command line interface. Telnet, Console, and SSH are all methods that can be used to access the CLI. Telnet is a network protocol used to establish a remote command line session, Console refers to accessing the CLI directly from the physical device, and SSH (Secure Shell) is a network protocol that provides secure remote access to the CLI.

Submit
4. According to the bottom of page one, where are firewalls placed?

Explanation

Firewalls are placed between trusted and untrusted networks. This means that they are positioned at the boundary where the trusted network (such as an internal network) connects with the untrusted network (such as the internet). By being placed in this location, firewalls can monitor and control the incoming and outgoing network traffic, ensuring that only authorized and safe data is allowed to pass through while blocking any potentially harmful or unauthorized access attempts.

Submit
5. What is the default device name on the ASA?

Explanation

The default device name on the ASA is "CiscoASA".

Submit
6. What does ASA stand for?

Explanation

ASA stands for Adaptive Security Appliance. This term refers to a firewall and security device developed by Cisco Systems. The ASA provides network security by combining firewall, VPN (Virtual Private Network), and intrusion prevention system capabilities. It is designed to protect networks from various threats and attacks, ensuring the confidentiality, integrity, and availability of network resources.

Submit
7. Where do I go in the ASDM software to configure an IP address on an interface?

Explanation

The correct answer is "Configuration\Device Setup\Interfaces." This is the correct location in the ASDM software to configure an IP address on an interface. The "Device Setup" menu allows users to configure various settings related to the device, including network interfaces. Within the "Interfaces" submenu, users can select the specific interface they want to configure and then set the desired IP address.

Submit
8. At what baud rate should you set your terminal emulation program in order to connect to the ASA and access the CLI?

Explanation

To connect to the ASA and access the CLI, you should set your terminal emulation program to a baud rate of 9600. Baud rate refers to the number of signal changes per second in a communication channel, and setting it to 9600 ensures a reliable and efficient connection between the terminal emulation program and the ASA.

Submit
9. Which one of these commands will show me the license information on the ASA?

Explanation

The "Show Version" command will provide the license information on the ASA. This command displays detailed information about the software and hardware components of the ASA, including the license information. It is commonly used to verify the software version, activation key, and license details of the ASA device.

Submit
10. Why is it safer to have an IPS rather than an IDS?

Explanation

An Intrusion Prevention System (IPS) is safer to have than an Intrusion Detection System (IDS) because an IPS not only detects malicious activity but also takes immediate action to prevent it. By actively blocking and filtering incoming packets, an IPS can stop potential threats from reaching the network, reducing the risk of successful attacks. In contrast, an IDS only alerts the user to malicious activity without actively blocking it, leaving the network vulnerable to potential damage or compromise.

Submit
11. Whatis the max speed of the switchports on the 5505?

Explanation

The correct answer is 100mbps. The 5505 switchports have a maximum speed of 100mbps.

Submit
12. How many Vlans can be created on the 5505 using the switchports by default?

Explanation

The correct answer is 3 because the Cisco ASA 5505, by default, has three switchports that can be used to create VLANs. These switchports can be configured as access ports or trunk ports to support VLANs and allow for network segmentation and traffic isolation.

Submit
13. According to the textbook, what mode are you in if the prompt look like this “(configs)”?

Explanation

If the prompt looks like "(configs)", according to the textbook, the mode you are in is the Configuration mode.

Submit
14. Based on the solution you found for the question above, what does a firewall use to base its decisions on which traffic to permit or deny into the network?

Explanation

A firewall uses explicit preconfigured policies and rules to determine which traffic to allow or block from entering the network. These policies and rules are set by the network administrator and dictate the criteria that the firewall uses to make decisions. By following these predefined policies and rules, the firewall can effectively filter and control the incoming and outgoing traffic, ensuring the security and integrity of the network.

Submit
15. Which layer 4 protocol will pattern matching work against?

Explanation

Pattern matching typically works against the TCP protocol at the layer 4 of the OSI model. TCP (Transmission Control Protocol) is a reliable, connection-oriented protocol that ensures the delivery of data packets in the correct order and without errors. Pattern matching involves analyzing the content of the TCP packets to identify specific patterns or signatures, which can be useful for various purposes such as intrusion detection, network monitoring, and content filtering.

Submit
16. If a user selects "NO" at the setup menu when the ASA starts up, what will the hostname of the device be?

Explanation

If a user selects "NO" at the setup menu when the ASA starts up, the hostname of the device will be CiscoASA.

Submit
17. Where is the ASDM software stored at on the ASA?

Explanation

The ASDM software is stored in the Flash memory of the ASA. Flash memory is a type of non-volatile storage that retains data even when power is lost. It is commonly used in networking devices like the ASA to store firmware, operating systems, and other software. Storing the ASDM software in Flash memory allows for easy access and quick retrieval when needed.

Submit
18. What is the purpose of a packet filter?

Explanation

A packet filter is used to control access to specific network segments by defining which traffic can pass through them. It allows the network administrator to set rules and filters that determine which packets are allowed to enter or leave a particular network segment. This helps in enhancing network security by preventing unauthorized access and controlling the flow of traffic within the network. By selectively allowing or blocking packets based on defined criteria, a packet filter helps in managing and securing network resources effectively.

Submit
19. What does the firewall do with NAT?

Explanation

The firewall with NAT hides the internal private addresses from the unprotected network and exposes only its own address. This means that when traffic passes through the firewall, the internal IP addresses of the devices on the private network are replaced with the firewall's public IP address. This provides an additional layer of security by preventing direct access to the private network and only allowing communication through the firewall's address.

Submit
20. By default, without any configuration form you, the ASA has a default inside IP address of?

Explanation

By default, the ASA does not have an IP address assigned to its inside interface. It needs to be manually configured with an IP address for communication on the inside network.

Submit
21. According to page two, what is the primary task of the firewall?

Explanation

The primary task of a firewall, as mentioned on page two, is to deny or permit traffic that attempts to enter the network. Firewalls act as a barrier between the internal network and external networks, filtering incoming traffic based on predetermined rules. They can deny or permit traffic based on factors such as IP addresses, port numbers, and protocols. By doing so, firewalls help protect the network from unauthorized access and potential security threats.

Submit
22. Which one is NOT a class B private ip address?

Explanation

The IP address 172.32.12.15 is not a class B private IP address because class B private IP addresses range from 172.16.0.0 to 172.31.255.255. The given IP address falls outside of this range, making it not a valid class B private IP address.

Submit
23. What is it called when a program attempts to store more data in a temporary storage area within memory than it was designed to hold?

Explanation

A buffer overflow occurs when a program tries to store more data in a temporary storage area within memory than it was originally designed to hold. This can lead to the corruption of nearby data or even the execution of malicious code. It is a common vulnerability that can be exploited by attackers to gain unauthorized access or control over a system.

Submit
24. What is an attack for which there is no signature called?

Explanation

A zero-day exploit is an attack for which there is no signature available. This means that it is an attack that takes advantage of a software vulnerability that is unknown to the software vendor and for which no patch or fix has been developed. Since there is no knowledge or signature of this exploit, it becomes difficult to detect and defend against, making it a significant threat to computer systems and networks.

Submit
25. If you accidently type NO in for the setup option, is there another way to get into setup (according to the text) without rebooting or power cycling the ASA?

Explanation

The correct answer is "Type setup in configs mode." This means that if you accidentally type "NO" for the setup option, you can still access the setup mode by typing "setup" in the configuration mode. This allows you to make changes to the ASA without having to reboot or power cycle it.

Submit
26. What is the flash card used for on the ASA 5510 besides storing the IOS?

Explanation

The flash card on the ASA 5510 is used for saving configurations. Configurations include settings and parameters that define how the device operates, such as network settings, security policies, and access control rules. By storing configurations on the flash card, they can be easily backed up, restored, or transferred to other devices. This helps in maintaining consistent and reliable network configurations across multiple devices and simplifies the management of the ASA 5510.

Submit
27. What kind of address translation would I use if I had a web server that resided on the internal network that people needed to access from the public side?

Explanation

Static translation would be the appropriate kind of address translation to use in this scenario. Static translation involves mapping a specific internal IP address to a specific external IP address, allowing external users to access the web server on the internal network. This type of translation does not change over time and remains constant, providing a reliable and consistent connection for accessing the server from the public side.

Submit
28. What is meant by Stateful Inspection?

Explanation

Stateful Inspection refers to the tracking of every packet passing through an interface by ensuring that they are valid, established connections. This means that the firewall or network device monitors the state of each connection and keeps track of the state information for future packets. It checks if the packets are part of an existing connection or if they are trying to establish a new connection. This allows the firewall to make more informed decisions about which packets to allow or block based on the context of the connection.

Submit
29. True or false, packet filters do not commonly inspect layer 4 fields like the sequence number and ACK fields?

Explanation

Packet filters commonly inspect layer 3 fields such as source and destination IP addresses, as well as layer 4 fields such as source and destination port numbers. However, they do not commonly inspect layer 4 fields like the sequence number and ACK fields. Therefore, the statement "True" is correct.

Submit
30. At which layer do the majority of proxy firewalls operate at?

Explanation

Proxy firewalls operate at the application layer. This layer is responsible for providing services directly to the user applications. By operating at this layer, proxy firewalls can intercept and filter application-layer protocols such as HTTP, FTP, and SMTP. They can inspect the content of the traffic and make decisions based on application-specific rules. This allows them to provide more advanced security features, such as content filtering, application-level access control, and protocol validation.

Submit
31. What  does the book call a "popular software application that you can install on end-user machines or servers to protect them from external security threats and intrusions"?

Explanation

A personal firewall is a popular software application that can be installed on end-user machines or servers to protect them from external security threats and intrusions. It acts as a barrier between the user's device and the internet, monitoring incoming and outgoing network traffic and blocking any unauthorized access attempts. It helps in preventing malicious attacks, such as hacking and unauthorized access to sensitive data, by filtering network traffic and allowing only legitimate connections.

Submit
32. What are the two different modes when using IPSEC?

Explanation

Transport mode and Tunnel mode are the two different modes when using IPSEC. Transport mode encrypts only the data portion of the IP packet, leaving the header untouched. It is typically used for end-to-end communication between two hosts. Tunnel mode, on the other hand, encrypts both the data and the original IP header, creating a new IP packet. It is commonly used for securing communication between two networks, where the original IP header needs to be protected.

Submit
33. What command do I type in to enter a new license key?

Explanation

To enter a new license key, the correct command to type in is "activation-key". This command is used to activate or update the license key on a system. It is a standard command used in many software applications to input license information and unlock additional features or functionalities.

Submit
34. In the "HOME" screen of the ASDM software, where would I look to find information about the number of active TCP connections going through the ASA?

Explanation

In the "Traffic Status" section of the ASDM software's "HOME" screen, information about the number of active TCP connections going through the ASA can be found. This section provides details and statistics related to the traffic passing through the ASA, including the number of active TCP connections.

Submit
35. Which model of ASA does NOT support adding the AIP-SSM according to the book?

Explanation

The ASA 5505 model does not support adding the AIP-SSM according to the book.

Submit
36. How many PoE ports are there on the 5505 by default?

Explanation

The default number of PoE ports on the 5505 is 2.

Submit
37. Which module provides support for antivirus features?

Explanation

The CSC-SSM module provides support for antivirus features.

Submit
38. How big is the license key used to enable features on the ASA?

Explanation

The license key used to enable features on the ASA is a 40 digit hexadecimal number. Hexadecimal numbers are commonly used in computing systems, as they provide a convenient way to represent large binary numbers. The 40 digit length suggests that the license key is quite long, which may provide a high level of security and complexity.

Submit
39. How much does an AIP-SSM cost for the 5505 from CDW according to my powerpoint slide?

Explanation

The given answer suggests that the cost of an AIP-SSM for the 5505 from CDW according to the powerpoint slide is between $1,000 to $2,500.

Submit
40. Which of the following is NOT an element that could be inspected by a packet-filtering technique?

Explanation

Packet-filtering techniques are used to inspect and filter network traffic based on certain criteria. The source address, source port, and protocol are all elements that can be inspected by a packet-filtering technique. However, destination translation is not an element that can be inspected by this technique. Destination translation refers to the process of translating the destination address of a packet, which is typically done by network address translation (NAT) devices. Packet-filtering techniques do not have the capability to inspect or modify destination translation information.

Submit
41. What is the first octet of a class A private ip address when expressed in binary?

Explanation

The first octet of a class A private IP address when expressed in binary is 00001010. In class A, the first octet ranges from 0 to 127, and private IP addresses fall within the range of 10.0.0.0 to 10.255.255.255. Therefore, the binary representation of the first octet is 00001010.

Submit
42. The process of allowing many devices on the internal protected network to share one ip address by inspecting the layer 4 information of the packet is called?

Explanation

Port address translation (PAT) is the process of allowing multiple devices on the internal protected network to share a single IP address by inspecting the layer 4 information of the packet. This technique is commonly used in network address translation (NAT) to conserve IP addresses. By assigning unique port numbers to each device, the router can keep track of the different connections and route the packets accordingly. This allows for more efficient use of IP addresses and helps in securing the internal network.

Submit
43. What does a solid amber light on the status LED mean?

Explanation

A solid amber light on the status LED indicates that the system tests have failed. This means that there is an issue or malfunction in the system that needs to be addressed. It could be a hardware or software problem that needs to be diagnosed and fixed before the system can function properly.

Submit
44. How long of a time period does the ASDM display on the HOME screen? If the ASA says there have been 50 active TCP connections, what is the timeframe it is measuring that in?

Explanation

The ASDM displays a time period of 5 minutes on the HOME screen. Therefore, if the ASA says there have been 50 active TCP connections, it is measuring that within the 5-minute timeframe.

Submit
45. What is the default enable password on the ASA?

Explanation

The correct answer is "There is none by default" because the ASA (Adaptive Security Appliance) does not have a default enable password. When initially setting up the ASA, the user is prompted to create an enable password. If the user does not set a password during the initial setup, the enable password remains blank by default. It is important for the user to set a strong enable password to ensure the security of the ASA.

Submit
46. Which module is required for IPS?

Explanation

The AIP-SSM module is required for IPS. The AIP-SSM (Advanced Inspection and Prevention Security Services Module) is specifically designed for intrusion prevention and detection. It provides real-time threat protection, network visibility, and advanced security features. The CSC-SSM (Content Security and Control Security Services Module) is focused on content filtering and anti-malware, while the SSC-SSM (Security Services Card) is used for firewall and VPN services. OU812 is not a valid module for IPS.

Submit
47. What scanning software does the CSC-SSM module use?

Explanation

The CSC-SSM module uses Trend Micro scanning software.

Submit
48. During IKE negotiation, what protocol and port number are used?

Explanation

During IKE (Internet Key Exchange) negotiation, UDP (User Datagram Protocol) is used as the protocol and port number 500 is used. UDP is a lightweight protocol that does not guarantee delivery or order of packets, making it suitable for the high-speed and low-latency requirements of IKE negotiation. Port number 500 is specifically assigned for IKE negotiation, allowing devices to communicate and exchange security parameters for establishing a secure VPN (Virtual Private Network) connection.

Submit
49. What does Deep Packet Inspection do?

Explanation

Deep Packet Inspection is a process used by firewalls to analyze the content of network packets at layer 7 of the OSI model. By examining the specific layer 7 payloads, firewalls can identify and protect against security threats. This technique involves searching for a fixed sequence of bytes within the packets traversing the network, allowing the firewall to detect and block malicious or unauthorized traffic.

Submit
50. How often is the information on the HOME screen refreshed on the ASDM software?

Explanation

The information on the HOME screen of the ASDM software is refreshed every 10 seconds. This means that any data or statistics displayed on the HOME screen will be updated every 10 seconds to provide the user with the most current information. This frequent refresh rate allows users to monitor real-time data and make informed decisions based on the most up-to-date information available.

Submit
51. Which number is NOT a valid model of the AIP-SSM module?

Explanation

The AIP-SSM module typically uses positive numbers as model numbers. Since -30 is a negative number, it is not a valid model of the AIP-SSM module.

Submit
52. How much does the CSC-SSM-10 cost from CDW? (CDW Part# 973275)

Explanation

The CSC-SSM-10 from CDW costs between $2000 to $4000.

Submit
53. What does an application proxy do?

Explanation

An application proxy operates as an intermediary agent on behalf of clients that are on a private or protected network. It acts as a gateway between the client and the destination server, intercepting and forwarding requests on behalf of the client. This allows the proxy to provide additional security measures, such as filtering traffic and controlling access to specific network segments. The proxy also hides the internal private addresses from the unprotected network, adding an extra layer of privacy and protection.

Submit
54. What is the maximum number of Vlans you are able to configure on the base ASA?

Explanation

The maximum number of VLANs that can be configured on the base ASA is 3. This means that the ASA can support up to 3 separate VLANs for network segmentation and traffic management purposes.

Submit
55. If I have an ASA 5510 and I add an AIP-SSM-10 module and I don’t use 3DES/AES, how much of a reduction in throughput would I have? Your gonna have to think out of the box a bit on this one, the answer is not spelled out for you in the book.

Explanation

Adding an AIP-SSM-10 module to an ASA 5510 without using 3DES/AES would result in a reduction in throughput of 150 mbps. This suggests that the AIP-SSM-10 module has a maximum throughput of 150 mbps and not using 3DES/AES does not further impact the reduction in throughput.

Submit
56. According to the text, what should flow control be set at?

Explanation

The text suggests that flow control should be set at hardware.

Submit
57. What does the book call a set of conditions that point out some type of intrusion occurance?

Explanation

A signature is referred to as a set of conditions that indicate the occurrence of an intrusion. It is a specific pattern or characteristic that is associated with a known threat or attack. By identifying these signatures, a system can detect and respond to potential intrusions or security breaches.

Submit
58. If I set the inside IP address to 192.168.1.1, what would I type into my browser to access the ASDM?

Explanation

To access the ASDM, which is a web-based management tool for Cisco devices, you would need to type "https://192.168.1.1/admin" into your browser. The "https://" indicates that it is a secure connection, while "192.168.1.1" is the IP address of the device. The "/admin" specifies the path to the ASDM interface.

Submit
59. What can I purchase to get some of the switchports to function at gigabit speed on the 5510?

Explanation

To enable gigabit speed on the switchports of the 5510, a Security Plus Upgrade License is required. This license provides additional features and capabilities, including the ability to support gigabit speed on the switchports. The AIP-SSM Module and CSC-SSM Module are not related to the switchports' speed, and the optional 1gig Memory Module does not affect the switchports' functionality. Therefore, the Security Plus Upgrade License is the correct answer.

Submit
60. What is the smallest ASA you can buy with a gigabit interface without buying an additional license upgrade?

Explanation

The correct answer is 5520 because it is the smallest ASA model that comes with a gigabit interface without requiring an additional license upgrade. This means that you can achieve high-speed data transfer without any additional cost or hassle.

Submit
61. Which model of ASA supports up to 1 million connections?

Explanation

The 5580-20 model of ASA supports up to 1 million connections.

Submit
62. At which layer of the OSI model do packet filters typically operate at?

Explanation

Packet filters typically operate at the Network layer of the OSI model. This layer is responsible for routing and addressing data packets across different networks. Packet filters examine the header information of each packet and make decisions based on the source and destination IP addresses, port numbers, and other parameters. By filtering packets at the Network layer, packet filters can control the flow of network traffic and enforce security policies, such as allowing or blocking specific types of packets.

Submit
63. If you want to preview commands in the ASDM software before they are sent to the ASA, where do you go to turn that on?

Explanation

To preview commands in the ASDM software before they are sent to the ASA, you need to go to Tools\Preferences. This option allows you to review the commands and make any necessary changes or adjustments before they are actually implemented on the ASA. It provides an additional layer of control and ensures that the correct commands are being sent to the device, minimizing the risk of errors or unintended consequences.

Submit
64. What port numbers are used for the PoE ports?

Explanation

The correct answer is 6 and 7. These port numbers are used for the Power over Ethernet (PoE) ports. PoE allows for both power and data to be transmitted over the same Ethernet cable, eliminating the need for separate power cables. Port numbers 6 and 7 are specifically designated for PoE, indicating that these ports are capable of providing power to connected devices.

Submit
65. How much does an ASA 5510 cost from CDW with no extra security license? (CDW Part# 792589)

Explanation

The correct answer is $2000 to $3000. This suggests that the cost of an ASA 5510 from CDW, without any additional security license, falls within the range of $2000 to $3000.

Submit
66. Which of the following has a major disadvantage of generating a considerably high amount of false positives?

Explanation

Pattern matching has a major disadvantage of generating a considerably high amount of false positives. This is because pattern matching involves searching for specific patterns or sequences of data, and it can sometimes mistakenly identify unrelated data as matching the pattern. This can result in a large number of false positive matches, which can be time-consuming and inefficient to analyze and filter through.

Submit
67. When using the CLI, what mode is used to enter a security level?

Explanation

p70

Submit
68. What is the maximum number of Vlans supports on the 5510 without upgrading the license?

Explanation

The maximum number of VLANs supported on the 5510 without upgrading the license is 50. This means that the device can handle up to 50 separate virtual LANs, allowing for network segmentation and improved network management.

Submit
69. How much does the security license upgrade cost from CDW? NOT the promo license, cdw part# 1761242.

Explanation

The given answer, "Over $400," suggests that the cost of the security license upgrade from CDW is higher than $400. This implies that the upgrade is quite expensive and may not be affordable for everyone.

Submit
70. Where does the ASDM software store error logs/messages?

Explanation

The ASDM software stores error logs/messages on the user's computer. This is because the ASDM software is typically installed on the user's computer and it logs any errors or messages locally on the computer for easy access and troubleshooting. Storing the logs on the user's computer allows for quick retrieval and analysis of the logs without the need to access the ASA or any other external storage.

Submit
71. Can the ASA scan HTTPS traffic if you have a CSC-SSM module installed?

Explanation

The ASA cannot scan HTTPS traffic if a CSC-SSM module is installed. The CSC-SSM module is designed to inspect and filter HTTP traffic, but it does not have the capability to decrypt and inspect encrypted HTTPS traffic. Therefore, the ASA would not be able to scan the contents of HTTPS traffic passing through the network.

Submit
72. What is the default SSH session username used by the 5505?

Explanation

The default SSH session username used by the 5505 is "PIX".

Submit
73. How many IPSec VPN connections does the 5510 allow without upgrading the license?

Explanation

The Cisco ASA 5510 firewall allows up to 250 IPSec VPN connections without requiring a license upgrade. This means that organizations can establish secure VPN connections for up to 250 remote users or branch offices without incurring additional costs. This feature is beneficial for small to medium-sized businesses that need to connect multiple locations or provide remote access for a large number of employees.

Submit
74. On the 5510, enabling the 3DES/AES encryption slows down the firewall throughput by how many mbps?

Explanation

Enabling the 3DES/AES encryption on the 5510 firewall reduces the throughput by 130 mbps. This means that when the encryption is enabled, the firewall can process data at a speed that is 130 mbps slower compared to when the encryption is disabled. This reduction in throughput is due to the additional processing required for encryption and decryption of data, which takes up computational resources and slows down the overall performance of the firewall.

Submit
75. How much does an ASA 5505 cost with a standard 10 user bundle from CDW?

Explanation

The given answer states that the cost of an ASA 5505 with a standard 10 user bundle from CDW is over $400. This implies that the price for this product is higher than $400.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 14, 2012
    Quiz Created by
    Jjscarpino4
Cancel
  • All
    All (75)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is the symbol for the prompt in the CLI that lets you know you...
When dealing with security levels, what is the most secure level?
Which one is NOT a way to access the CLI?
According to the bottom of page one, where are firewalls placed?
What is the default device name on the ASA?
What does ASA stand for?
Where do I go in the ASDM software to configure an IP address on an...
At what baud rate should you set your terminal emulation program in...
Which one of these commands will show me the license information on...
Why is it safer to have an IPS rather than an IDS?
Whatis the max speed of the switchports on the 5505?
How many Vlans can be created on the 5505 using the switchports by...
According to the textbook, what mode are you in if the prompt look...
Based on the solution you found for the question above, what does a...
Which layer 4 protocol will pattern matching work against?
If a user selects "NO" at the setup menu when the ASA...
Where is the ASDM software stored at on the ASA?
What is the purpose of a packet filter?
What does the firewall do with NAT?
By default, without any configuration form you, the ASA has a default...
According to page two, what is the primary task of the firewall?
Which one is NOT a class B private ip address?
What is it called when a program attempts to store more data in a...
What is an attack for which there is no signature called?
If you accidently type NO in for the setup option, is there another...
What is the flash card used for on the ASA 5510 besides storing the...
What kind of address translation would I use if I had a web server...
What is meant by Stateful Inspection?
True or false, packet filters do not commonly inspect layer 4 fields...
At which layer do the majority of proxy firewalls operate at?
What  does the book call a "popular software application...
What are the two different modes when using IPSEC?
What command do I type in to enter a new license key?
In the "HOME" screen of the ASDM software, where would I...
Which model of ASA does NOT support adding the AIP-SSM according to...
How many PoE ports are there on the 5505 by default?
Which module provides support for antivirus features?
How big is the license key used to enable features on the ASA?
How much does an AIP-SSM cost for the 5505 from CDW according to my...
Which of the following is NOT an element that could be inspected by a...
What is the first octet of a class A private ip address when expressed...
The process of allowing many devices on the internal protected network...
What does a solid amber light on the status LED mean?
How long of a time period does the ASDM display on the HOME screen? If...
What is the default enable password on the ASA?
Which module is required for IPS?
What scanning software does the CSC-SSM module use?
During IKE negotiation, what protocol and port number are used?
What does Deep Packet Inspection do?
How often is the information on the HOME screen refreshed on the ASDM...
Which number is NOT a valid model of the AIP-SSM module?
How much does the CSC-SSM-10 cost from CDW? (CDW Part# 973275)
What does an application proxy do?
What is the maximum number of Vlans you are able to configure on the...
If I have an ASA 5510 and I add an AIP-SSM-10 module and I...
According to the text, what should flow control be set at?
What does the book call a set of conditions that point out some type...
If I set the inside IP address to 192.168.1.1, what would I type into...
What can I purchase to get some of the switchports to function at...
What is the smallest ASA you can buy with a gigabit interface without...
Which model of ASA supports up to 1 million connections?
At which layer of the OSI model do packet filters typically operate...
If you want to preview commands in the ASDM software before they are...
What port numbers are used for the PoE ports?
How much does an ASA 5510 cost from CDW with no extra security...
Which of the following has a major disadvantage of generating a...
When using the CLI, what mode is used to enter a security level?
What is the maximum number of Vlans supports on the 5510 without...
How much does the security license upgrade cost from CDW? NOT the...
Where does the ASDM software store error logs/messages?
Can the ASA scan HTTPS traffic if you have a CSC-SSM module installed?
What is the default SSH session username used by the 5505?
How many IPSec VPN connections does the 5510 allow without upgrading...
On the 5510, enabling the 3DES/AES encryption slows down the firewall...
How much does an ASA 5505 cost with a standard 10 user bundle from...
Alert!

Advertisement