Midterm Chapter 4-6

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jjscarpino4
J
Jjscarpino4
Community Contributor
Quizzes Created: 3 | Total Attempts: 3,456
| Attempts: 1,426 | Questions: 68
Please wait...
Question 1 / 68
0 %
0/100
Score 0/100
1. Is it possible to configure the ASA to use authentication for everyone except Joe Donut? In other words, can I excuse a person or user account from having to authenticate and make everyone else in the organization authenticate?

Explanation

Yes, it is possible to configure the ASA to use authentication for everyone except Joe Donut. This can be achieved by creating an exception or exemption rule specifically for Joe Donut's user account, allowing him to bypass the authentication process while still requiring everyone else in the organization to authenticate.

Submit
Please wait...
About This Quiz
Midterm Chapter 4-6 - Quiz

Midterm Chapter 4-6 evaluates understanding of Access Control Lists (ACLs), focusing on their components, behaviors, and specific functionalities in network security. It tests key skills in configuring and... see moretroubleshooting ACLs, essential for network administration. see less

2. True or false, only the first packet of a flow is inspected by the ACL , after that all subsequent packets matching that connection are not checked.

Explanation

The statement is true. ACLs (Access Control Lists) are used to control network traffic by filtering packets based on specific criteria. Once a packet matches a flow, the ACL will inspect it and make a decision (allow or deny). However, for subsequent packets that belong to the same flow, the ACL does not need to inspect them again as the decision has already been made. This helps improve network performance by reducing the processing overhead on the ACL for every packet in the same flow.

Submit
3. When passwords are sent from the ASA to the radius server on the internal network, are they encrypted?

Explanation

Yes, passwords are encrypted when they are sent from the ASA to the radius server on the internal network. Encryption ensures that the passwords are securely transmitted and cannot be intercepted or accessed by unauthorized individuals. This helps to protect the confidentiality and integrity of the passwords, ensuring that they remain secure during transmission.

Submit
4. Is it true that LDAP only provides authorization services and if you want authentication services you need to find a separate protocol?

Explanation

LDAP (Lightweight Directory Access Protocol) is primarily used for directory services, including user authentication and authorization. However, it is incorrect to state that LDAP only provides authorization services. In fact, LDAP supports both authentication and authorization functionalities. It can authenticate users by verifying their credentials against the directory server and also authorize their access to specific resources based on their permissions. Therefore, the correct answer should be "No" instead of "Yes".

Submit
5. Is it possible to customize the authentication prompts that a user sees when trying to access secure recourses through the ASA?

Explanation

Yes, it is possible to customize the authentication prompts that a user sees when trying to access secure resources through the ASA. This can be done by configuring the ASA to use customized login banners or by implementing a customized web portal for authentication. These customization options allow organizations to provide a branded and personalized authentication experience for their users, enhancing security and user experience.

Submit
6. True of False, an extended ACL only filters by IP address?

Explanation

An extended ACL does not only filter by IP address. It can also filter based on other criteria such as protocol type, source and destination port numbers, and specific TCP flags. This allows for more granular control and flexibility in determining what traffic is allowed or denied.

Submit
7. What kind of ACL is this - access-list 102 permit tcp any 192.168.100.200 0.0.0.0 eq 25

Explanation

The given access control list (ACL) is an extended ACL. This can be determined by looking at the syntax of the command. In an extended ACL, we can specify more specific criteria such as source and destination IP addresses, protocols, and port numbers. In this case, the ACL permits TCP traffic from any source IP address to the destination IP address 192.168.100.200 on port 25, which is commonly used for SMTP (Simple Mail Transfer Protocol) for email communication.

Submit
8. What is it called when I prove I am who I say I am?

Explanation

Authentication is the process of proving one's identity or verifying that someone is who they claim to be. It involves providing credentials, such as a username and password, or using biometric measures like fingerprints or facial recognition. By successfully completing the authentication process, individuals can gain access to systems, accounts, or resources that require verification of their identity.

Submit
9. Does the ASA support Authorization when using Radius?

Explanation

The ASA (Adaptive Security Appliance) does support Authorization when using Radius. Radius is a protocol commonly used for authentication, authorization, and accounting (AAA) purposes in network security. By integrating Radius with the ASA, administrators can enforce access control policies and determine what actions users are allowed to perform on the network. This authorization process helps ensure that only authorized individuals or devices can access specific resources or perform certain actions within the network.

Submit
10. Which routing protocol is Cisco proprietary?

Explanation

EIGRP is Cisco proprietary because it was developed by Cisco Systems and is only available on Cisco devices. Unlike RIP and OSPF, which are open standard protocols that can be used on various vendors' equipment, EIGRP is exclusive to Cisco. SpongeBob is not a routing protocol and is not relevant to this question.

Submit
11. If I manually put in a route it is called a________?

Explanation

A manually inputted route is called a static route. This means that the route is manually configured and does not change unless manually updated. It is commonly used in small networks or for specific network configurations where the route needs to remain constant.

Submit
12. What version of RIP supports CIDR?

Explanation

RIP (Routing Information Protocol) is a distance-vector routing protocol that is used to exchange routing information between routers. Version 1 of RIP does not support Classless Inter-Domain Routing (CIDR), which is a technique used to allocate IP addresses more efficiently. However, Version 2 of RIP does support CIDR. Therefore, the correct answer is Version 2.

Submit
13. True or False, ICMP is considered a unidirectional protocol and requires a rule for each direction you wish it to flow.

Explanation

ICMP (Internet Control Message Protocol) is considered a unidirectional protocol because it is primarily used for error reporting and diagnostic purposes in IP networks. It does not establish a connection or maintain a session between two hosts, unlike bidirectional protocols such as TCP or UDP. In order to allow ICMP traffic to flow in both directions, separate rules need to be configured for each direction. Therefore, the statement that ICMP is considered a unidirectional protocol and requires a rule for each direction is true.

Submit
14. If I want to send default route information with my RIP advertisements, what command do I use?

Explanation

The correct answer is "Default-information originate." This command is used in RIP (Routing Information Protocol) to advertise the default route to other routers in the network. By using this command, the router sends the default route information in its RIP advertisements, allowing other routers to learn about the default route and use it for forwarding packets to destinations outside of their own network.

Submit
15. What does OSPF stand for?

Explanation

OSPF stands for Open Shortest Path First. This is a routing protocol used in computer networks to determine the best path for data packets to travel from one network to another. It calculates the shortest path based on the cost of each link and updates the routing table accordingly. By using OSPF, networks can efficiently exchange routing information and dynamically adapt to changes in network topology.

Submit
16. Is it possible to configure the ASA to authenticate users of the ASDM by using a remote server like RADIUS?

Explanation

Yes, it is possible to configure the ASA (Adaptive Security Appliance) to authenticate users of the ASDM (Adaptive Security Device Manager) by using a remote server like RADIUS (Remote Authentication Dial-In User Service). This allows for centralized authentication and authorization of users accessing the ASDM interface, providing an additional layer of security and control.

Submit
17. True or False, named ACL's have to include the "standard" or "extended" parameter?

Explanation

Named ACL's have to include the "standard" or "extended" parameter. This means that when creating a named ACL, it is necessary to specify whether it is a standard or extended ACL.

Submit
18. True or false, if a packet flow comes in and the first line of the ACL matches the packet, no further ACE's are checked.

Explanation

If the first line of the Access Control List (ACL) matches the packet flow, it means that the conditions specified in that line are satisfied by the packet. In this case, there is no need to check any further Access Control Entries (ACEs) in the ACL because the packet has already been matched and the corresponding action can be taken. Therefore, the statement "if a packet flow comes in and the first line of the ACL matches the packet, no further ACE's are checked" is true.

Submit
19. Which of the two open-source routing protocols are designed for large-scale networks?

Explanation

OSPF (Open Shortest Path First) is an open-source routing protocol that is specifically designed for large-scale networks. It is widely used in enterprise networks and internet service provider networks. OSPF uses a link-state routing algorithm, which allows it to efficiently calculate the shortest path to a destination and adapt to changes in the network topology. It supports large networks with thousands of routers and can scale well. Therefore, OSPF is the correct answer for this question.

Submit
20. True or False, IP6 ACL's are only supported in version 6.2 of the ASDM or higher?

Explanation

IP6 ACL's are only supported in version 6.2 of the ASDM or higher.

Submit
21. If I want to stop the router from advertising RIP updates through an interface, what command do I use?

Explanation

The command "Passive-interface" is used to stop the router from advertising RIP updates through an interface. By configuring an interface as passive, the router will still receive RIP updates from that interface but will not send any updates out through it. This is useful when you want to prevent certain interfaces from participating in RIP routing updates while still allowing them to receive routing information from other interfaces.

Submit
22. What was the name of the routing protocol that was a "link-state" protocol?

Explanation

OSPF, which stands for Open Shortest Path First, is a routing protocol that is classified as a "link-state" protocol. This means that it uses information about the state of links in a network to determine the shortest path to a destination. OSPF calculates the cost of each link based on factors such as bandwidth and congestion, and then uses this information to build a database of the network's topology. By considering the state of each link, OSPF is able to make more informed routing decisions and efficiently route data packets through the network.

Submit
23. True or False, Standard ACL's only work in transparent mode.

Explanation

Standard ACL's can work in both transparent mode and routed mode. Transparent mode is used in a firewall to filter traffic between two networks without changing the IP addresses. In this mode, the firewall acts as a bridge between the two networks. However, standard ACL's can also be applied to interfaces in routed mode, where the firewall is actively routing traffic between networks. Therefore, the statement that standard ACL's only work in transparent mode is false.

Submit
24. What is the term for how many times a packet is matched against an ACE?

Explanation

The term for how many times a packet is matched against an ACE is "hit count". This refers to the number of times a packet matches the conditions specified in an Access Control Entry (ACE) within a network device. By keeping track of the hit count, network administrators can monitor the traffic patterns and determine the effectiveness of their access control policies.

Submit
25. Which command will allow me to create a time-based ACL that will be enforced every Saturday?

Explanation

The command "Periodic" allows the creation of a time-based ACL that will be enforced every Saturday. This means that the ACL rules will only be applied and enforced on Saturdays, providing a specific time-based restriction.

Submit
26. What does RIP stand for?

Explanation

RIP stands for Routing Information Protocol. This protocol is used for routing and exchanging network information between routers in a network. It helps routers to determine the best path for data packets to travel from one network to another. RIP uses hop count as a metric to calculate the distance between routers and chooses the route with the fewest hops as the best route.

Submit
27. RIP has a limit of how many hops?

Explanation

RIP (Routing Information Protocol) has a limit of 15 hops. This means that RIP can only route packets to a maximum of 15 network hops away. If a destination network is more than 15 hops away, RIP will not be able to route the packets to that network.

Submit
28. Can I distribute static routes using EIGRP?

Explanation

Yes, static routes can be distributed using EIGRP. EIGRP is a routing protocol that supports the redistribution of routes between different routing protocols, including static routes. By redistributing static routes into EIGRP, the network administrator can make these routes available to other routers within the EIGRP domain. This allows for greater flexibility and control in network routing.

Submit
29. True of False, an ACL can inspect a packet header for layer 5 information?

Explanation

An ACL (Access Control List) cannot inspect a packet header for layer 5 information. ACLs are typically used for filtering network traffic based on layer 3 (network layer) and layer 4 (transport layer) information such as source and destination IP addresses, ports, and protocols. Layer 5 (session layer) information, which includes data related to establishing, managing, and terminating connections between network devices, is not typically inspected by ACLs. Therefore, the statement that an ACL can inspect a packet header for layer 5 information is false.

Submit
30. What command will display the routing table of the ASA?

Explanation

The correct answer is "Show route." This command is used to display the routing table of the ASA.

Submit
31. Can an ASA be connected to two different networks using two different routing protocols? In other words, can I have a RIP network connected and an EIGRP network connected and be able to route between both of them?

Explanation

Yes, an ASA can be connected to two different networks using two different routing protocols. This allows the ASA to route between both networks and enables communication between devices on each network.

Submit
32. What is this the main topic of this chapter (6)?

Explanation

The main topic of this chapter is AAA, which stands for Authentication, Authorization, and Accounting. AAA is a framework used in computer systems to control access to resources and track user activities. It involves verifying the identity of users, determining their access privileges, and logging their actions for auditing purposes. This chapter likely explores the concepts, principles, and implementation of AAA in network routing and switching.

Submit
33. Does OSPF use an area number?

Explanation

OSPF (Open Shortest Path First) does use an area number. OSPF divides a network into areas to improve scalability and reduce routing overhead. Each area is identified by a unique area number, and routers within the same area share routing information. This allows for efficient routing within the area and reduces the amount of routing information that needs to be exchanged between areas.

Submit
34. What are the entries called that make up an ACL?

Explanation

The entries that make up an ACL (Access Control List) are called ACE (Access Control Entries). ACEs define the permissions or restrictions for a particular user or group of users on a network device or system. They specify whether the user or group is allowed or denied access to specific resources or actions.

Submit
35. If I have BOTH an Absolute and a Periodic parameter configured in the same timerange, which one would be evaluated first?

Explanation

If both an Absolute and a Periodic parameter are configured in the same timerange, the Absolute parameter would be evaluated first. This means that the timerange specified by the Absolute parameter would take precedence over the timerange specified by the Periodic parameter.

Submit
36. What command can I run to only show the routes learned on the inside interface of the ASA?

Explanation

The correct answer is "Show route inside" because this command specifically instructs the ASA to display only the routes learned on the inside interface. By using the "inside" keyword, the command filters the output to show only the relevant information, making it easier for the user to identify and analyze the routes learned on the inside interface.

Submit
37. Which AAA protocol or service does the ASA NOT support?

Explanation

The ASA (Adaptive Security Appliance) does not support the DHCP (Dynamic Host Configuration Protocol) protocol or service. DHCP is used to automatically assign IP addresses and other network configuration settings to devices on a network. While the ASA can support other AAA (Authentication, Authorization, and Accounting) protocols such as RADIUS and TACACS+, it does not have the capability to act as a DHCP server or relay agent.

Submit
38. Where are new ACE's added to the ACL?

Explanation

New ACEs (Access Control Entries) are added to the bottom of the ACL (Access Control List). This is because the ACL is processed in a sequential manner from top to bottom, and the first matching ACE determines the access control decision. By adding new ACEs at the bottom, they have a lower priority and will only be evaluated if no previous ACEs match the criteria.

Submit
39. In the show route command, what letter signifies a route learned through RIP?

Explanation

The letter "R" signifies a route learned through RIP in the show route command. RIP (Routing Information Protocol) is a dynamic routing protocol that uses hop count as a metric to determine the best path for routing data packets. When the show route command is used, the "R" indicates that the route was learned through RIP.

Submit
40. OK, since you know the answer to the question above is yes, what is the command to make RIP work with another routing protocol?

Explanation

The command "redistribute" is used to make RIP work with another routing protocol. This command allows the redistribution of routes learned from one routing protocol into another routing protocol. By using this command, RIP can exchange routing information with other protocols, enabling communication and coordination between different routing protocols.

Submit
41. What port does TACACS+ use?

Explanation

TACACS+ uses port 49.

Submit
42. If I have an ACL that says permit 192.168.10.0 0.0.0.255, which address will it block?

Explanation

not-available-via-ai

Submit
43. Which routing protocol uses DUAL for calculating the metric (route options)?

Explanation

EIGRP (Enhanced Interior Gateway Routing Protocol) is the routing protocol that uses DUAL (Diffusing Update Algorithm) for calculating the metric or route options. DUAL allows EIGRP to quickly adapt to network changes and find the best path to a destination by considering multiple factors such as bandwidth, delay, reliability, and load. This makes EIGRP a highly efficient and scalable routing protocol for large networks.

Submit
44. Which routing protocol uses only hop-count as its metric?

Explanation

RIP (Routing Information Protocol) uses only hop-count as its metric. Hop-count refers to the number of routers a packet must pass through to reach its destination. RIP determines the best path to a destination based on the lowest hop-count. It is a distance-vector routing protocol that periodically shares routing information with neighboring routers, allowing them to update their routing tables. RIP is a simple and easy-to-configure protocol, but it may not be suitable for large networks due to its limited scalability.

Submit
45. What does the ip address of 209.165.201.2 signify in the following command – route outside 0.0.0.0 0.0.0.0 209.165.201.2 1

Explanation

The IP address 209.165.201.2 in the given command signifies the gateway. In networking, a gateway is a device or a computer that connects different networks together. It acts as an entry point to a network and allows devices from one network to communicate with devices from another network. In this command, the IP address 209.165.201.2 is specified as the gateway for the "outside" interface of the ASA (Adaptive Security Appliance). This means that any traffic destined for networks outside of the ASA will be sent to this IP address for further routing.

Submit
46. Which one is NOT a type of object group?

Explanation

The given answer "Internal" is the correct answer because the other options - "Network," "Protocol," and "Service" - are all types of object groups. However, "Internal" does not fall under the category of an object group.

Submit
47. True or False, anytime I use the "IN" parameter when applying an ACL to an interface, it means to check the traffic coming inside my network?

Explanation

Using the "IN" parameter when applying an ACL to an interface does not necessarily mean checking the traffic coming inside the network. The "IN" parameter refers to the direction of traffic flow relative to the interface where the ACL is applied. It could mean checking traffic coming into the interface from an external network or checking traffic going out of the interface towards an external network. Therefore, the statement is false.

Submit
48. What command will apply an ACL to an interface?

Explanation

The correct answer is "Access-group." This command is used to apply an Access Control List (ACL) to an interface. An ACL is a set of rules that determines what network traffic is allowed or denied on a network device. By using the access-group command, the specified ACL can be applied to a specific interface, allowing the network administrator to control the traffic flow.

Submit
49. Which command will allow me to create a specfic time-based ACL start and stop time?

Explanation

The command "Absolute" allows the creation of a specific time-based ACL start and stop time. This means that the ACL will only be active during the specified time period and will not be applied outside of that timeframe.

Submit
50. What command displays the EIGRP log?

Explanation

The correct answer is "Show EIGRP events." This command displays the EIGRP events log, which provides information about any EIGRP events or changes that have occurred in the network. By using this command, network administrators can troubleshoot and analyze the EIGRP routing protocol more effectively.

Submit
51. What kind of filtering do we apply to traffic that terminates on the security applicance?

Explanation

The correct answer is "To-the-box". This refers to the kind of filtering that is applied to traffic that terminates on the security appliance. "To-the-box" filtering means that the traffic is filtered based on its destination IP address, and is only allowed to reach the security appliance itself. This type of filtering is commonly used to protect the security appliance from any potentially malicious or unwanted traffic.

Submit
52. What command would I type in to show the statistics of only one AAA server?

Explanation

The correct answer is "Show aaa-server" because this command is used to display the configuration and statistics of AAA (Authentication, Authorization, and Accounting) servers. By typing this command, the user can view the details of all AAA servers configured on the system, including their statistics.

Submit
53. Which command will show me how many total packets are being dropped and what is causing the drop?

Explanation

The command "Show asp drop" will display the number of total packets being dropped and provide information about the reason for the drop. This command is specifically used to monitor the Adaptive Security Appliance (ASA) and identify any dropped packets, helping to troubleshoot network connectivity issues.

Submit
54. Which of the following is a RADIUS server that IS supported by the ASA?

Explanation

not-available-via-ai

Submit
55. How many total ACL's can I have applied to an interface if I only use standard and extended ACL's?

Explanation

You can have a total of 4 ACL's applied to an interface if you only use standard and extended ACL's.

Submit
56. True or False, I can use the "access-group" command to create groups of similar items like protocols or internal servers?

Explanation

The "access-group" command is used in Cisco IOS to apply an access control list (ACL) to a specific interface. It is not used to create groups of similar items like protocols or internal servers. Therefore, the given answer "False" is correct.

Submit
57. What do I use when I want to statically map multiple inside servers to one global IP address?

Explanation

Port Redirection is the correct answer because it allows for multiple inside servers to be mapped to a single global IP address. This technique involves redirecting incoming traffic on specific ports to different internal servers based on the port number. By using port redirection, multiple servers can share a single IP address while still being accessible from the outside network. This is commonly used in scenarios where there are limited available public IP addresses or when there is a need to consolidate multiple servers behind a single IP address.

Submit
58. In this command - route outside 0.0.0.0 0.0.0.0 209.165.201.2 1 what does the number one mean at the end of the command?

Explanation

The number one at the end of the command "route outside 0.0.0.0 0.0.0.0 209.165.201.2 1" represents the hop count. In networking, a hop refers to the movement of data from one network node to another. The hop count indicates the number of routers or network devices that the data must pass through to reach its destination. In this case, the hop count of 1 means that the destination is directly connected to the next hop, which is the IP address 209.165.201.2.

Submit
59. In the show route command, what letter signifies a route learned through EIGRP?

Explanation

In the show route command, the letter "D" signifies a route learned through EIGRP. EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary routing protocol that is used to exchange routing information between routers in a network. The "D" in the show route command indicates that the route was learned dynamically through EIGRP.

Submit
60. The ASA allows you to specify two difrent time restrictions. When setting the Absolute values it uses it uses the same start and date format as what other comand?

Explanation

Notes: top of page 169

Submit
61. What is the process of gathering and sending user information to an AAA server called?

Explanation

The process of gathering and sending user information to an AAA server is called accounting. This process involves keeping track of user activities, such as login and logout times, data usage, and other relevant information for billing, auditing, and network management purposes. Accounting helps in generating reports and monitoring user behavior on the network.

Submit
62. Does the ASA support accounting when using Kerberos?

Explanation

The ASA does not support accounting when using Kerberos.

Submit
63. What does this ACL do - access-list 102 permit tcp any 192.168.100.200 0.0.0.0 eq 25

Explanation

The given ACL (access-list 102 permit tcp any 192.168.100.200 0.0.0.0 eq 25) allows traffic to the Mail server. This is because it permits TCP traffic from any source IP address to the specific IP address 192.168.100.200 on port 25, which is the standard port for SMTP (Simple Mail Transfer Protocol) used for sending emails. Therefore, this ACL allows incoming traffic to the Mail server on port 25.

Submit
64. Now that you know what version of RIP supports CIDR, what the heck is CIDR?

Explanation

CIDR stands for Classless InterDomain Routing. It is a method used to allocate and manage IP addresses more efficiently. In traditional IP addressing, addresses were divided into classes, which led to wastage of IP addresses. CIDR allows for more flexible allocation of IP addresses by allowing the use of variable-length subnet masks. This means that IP addresses can be allocated in smaller blocks, reducing the overall wastage of IP addresses and improving the efficiency of routing on the internet.

Submit
65. What command could I type in to see the statistics about all AAA servers?

Explanation

The correct answer is "show aaa-server protocol". This command will display the statistics related to all AAA servers. It specifically focuses on the protocol used by the AAA servers, providing information on their status, connectivity, and any errors or events related to the protocol. By using this command, the user can obtain a comprehensive overview of the performance and functionality of all AAA servers in the network.

Submit
66. What is the message ID of an entry that shows a packet dropped due to the implicit deny at the end of an ACL?

Explanation

The message ID 106023 is the correct answer because it represents a packet being dropped due to the implicit deny at the end of an Access Control List (ACL). When a packet matches none of the permit conditions in an ACL, it is denied by default. This message ID is specifically associated with this type of event, indicating that the packet was dropped due to the implicit deny.

Submit
67. Does OSPF support the default-information originate command?

Explanation

OSPF does not support the default-information originate command. This command is used in other routing protocols, such as EIGRP, to advertise a default route into the OSPF domain. However, in OSPF, the use of a default route is achieved through other means, such as redistributing a default route from another routing protocol or configuring a static default route.

Submit
68. During the basic RADIUS authentication process, at what step does the radius server send an access-accept message?

Explanation

In the basic RADIUS authentication process, the RADIUS server sends an access-accept message at step four. This message is sent after the server receives and verifies the user's credentials, and it indicates that the authentication was successful.

Submit
View My Results

Quiz Review Timeline (Updated): Sep 1, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 01, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 20, 2012
    Quiz Created by
    Jjscarpino4
Cancel
  • All
    All (68)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Is it possible to configure the ASA to use authentication for everyone...
True or false, only the first packet of a flow is inspected by the ACL...
When passwords are sent from the ASA to the radius server on the...
Is it true that LDAP only provides authorization services and if you...
Is it possible to customize the authentication prompts that a user...
True of False, an extended ACL only filters by IP address?
What kind of ACL is this - access-list 102 permit tcp any...
What is it called when I prove I am who I say I am?
Does the ASA support Authorization when using Radius?
Which routing protocol is Cisco proprietary?
If I manually put in a route it is called a________?
What version of RIP supports CIDR?
True or False, ICMP is considered a unidirectional protocol and...
If I want to send default route information with my RIP...
What does OSPF stand for?
Is it possible to configure the ASA to authenticate users of the ASDM...
True or False, named ACL's have to include the "standard" or...
True or false, if a packet flow comes in and the first line of the ACL...
Which of the two open-source routing protocols are designed for...
True or False, IP6 ACL's are only supported in version 6.2 of the ASDM...
If I want to stop the router from advertising RIP updates through an...
What was the name of the routing protocol that was a "link-state"...
True or False, Standard ACL's only work in transparent mode.
What is the term for how many times a packet is matched against an...
Which command will allow me to create a time-based ACL that will be...
What does RIP stand for?
RIP has a limit of how many hops?
Can I distribute static routes using EIGRP?
True of False, an ACL can inspect a packet header for layer 5...
What command will display the routing table of the ASA?
Can an ASA be connected to two different networks using two different...
What is this the main topic of this chapter (6)?
Does OSPF use an area number?
What are the entries called that make up an ACL?
If I have BOTH an Absolute and a Periodic parameter configured in the...
What command can I run to only show the routes learned on the inside...
Which AAA protocol or service does the ASA NOT support?
Where are new ACE's added to the ACL?
In the show route command, what letter signifies a route learned...
OK, since you know the answer to the question above is yes, what is...
What port does TACACS+ use?
If I have an ACL that says permit 192.168.10.0 0.0.0.255, which...
Which routing protocol uses DUAL for calculating the metric (route...
Which routing protocol uses only hop-count as its metric?
What does the ip address of 209.165.201.2 signify in the following...
Which one is NOT a type of object group?
True or False, anytime I use the "IN" parameter when applying an ACL...
What command will apply an ACL to an interface?
Which command will allow me to create a specfic time-based ACL start...
What command displays the EIGRP log?
What kind of filtering do we apply to traffic that terminates on the...
What command would I type in to show the statistics of only one AAA...
Which command will show me how many total packets are being dropped...
Which of the following is a RADIUS server that IS supported by the...
How many total ACL's can I have applied to an interface if I only use...
True or False, I can use the "access-group" command to create groups...
What do I use when I want to statically map multiple inside servers to...
In this command - route outside 0.0.0.0 0.0.0.0 209.165.201.2 1 what...
In the show route command, what letter signifies a route learned...
The ASA allows you to specify two difrent time restrictions. When...
What is the process of gathering and sending user information to an...
Does the ASA support accounting when using Kerberos?
What does this ACL do - access-list 102 permit tcp any 192.168.100.200...
Now that you know what version of RIP supports CIDR, what the heck is...
What command could I type in to see the statistics about all AAA...
What is the message ID of an entry that shows a packet dropped due to...
Does OSPF support the default-information originate command?
During the basic RADIUS authentication process, at what step does the...
Alert!

Advertisement