Q11. An administrator installed a Cisco ASA that runs version 9.1. You are asked to configure the firewall through Cisco ASDM. 

When you attempt to connect to a Cisco ASA with a default configuration, which username and password grants you full access? 

A. admin / admin 

B. asaAdmin / (no password) 

C. It is not possible to use Cisco ASDM until a username and password are created via the username usernamepassword password CLI command. 

D. enable_15 / (no password) 

E. cisco / cisco 

Answer:


Q12. Which function in the Cisco ADSM ACL Manager pane allows an administrator to search for a specfic element? 

A. Find 

B. Device Management 

C. Search 

D. Device Setup 

Answer:


Q13. When you set a Cisco IOS Router as an SSH server, which command specifies the RSA public key of the remote peer when you set the SSH server to perform RSA-based authentication? 

A. router(config-ssh-pubkey-user)#key 

B. router(conf-ssh-pubkey-user)#key-string 

C. router(config-ssh-pubkey)#key-string 

D. router(conf-ssh-pubkey-user)#key-string enable ssh 

Answer:


Q14. Which feature is a limitation of a Cisco ASA 5555-X running 8.4.5 version with multiple contexts? 

A. Deep packet inspection 

B. Packet tracer 

C. IPsec 

D. Manual/auto NAT 

E. Multipolicy packet capture 

Answer:


Q15. Which cloud characteristic is used to describe the sharing of physical resources between various entities? 

A. Multitenancy 

B. Ubiquitous access 

C. Elasticity 

D. Resiliency 

Answer:


Q16. When configured in accordance to Cisco best practices, the ip verify source command can mitigate which two types of Layer 2 attacks? (Choose two.) 

A. rogue DHCP servers 

B. ARP attacks 

C. DHCP starvation 

D. MAC spoofing 

E. CAM attacks 

F. IP spoofing 

Answer: D,F 


Q17. Which cloud characteristic is used to describes the sharing of physical resource between various 

entities ? 

A. Elasticity 

B. Ubiquitous access 

C. Multitenancy 

D. Resiliency 

Answer:

Explanation: 

http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_12-3/123_cloud1.html 


Q18. When a Cisoc ASA CX module is managed by Cisco prime Security Manager in Multiple Device Mode , which mode does the firewall use? 

A. Multi mode 

B. Unmanaged mode 

C. Single mode 

D. Managed mode 

Answer:

Explanation: http://www.cisco.com/c/en/us/td/docs/security/asacx/9-1/user/guide/b_User_Guide_for_ASA_CX_and_PRSM_9_1b_User_Guide_for_ASA_CX_a nd_PR SM_9_1_chapter_011 0.html#task_7E648F43AD724DA2983699B12E92A528 


Q19. What are three attributes that can be applied to a user account with RBAC? (Choose three.) 

A. domain 

B. password 

C. ACE tag 

D. user roles 

E. VDC group tag 

F. expiry date 

Answer: B,D,F 


Q20. Which command sets the source IP address of the NetFlow exports of a device? 

A. ip source flow-export 

B. ip source netflow-export 

C. ip flow-export source 

D. ip netflow-export source 

Answer: