In this post, i will share the answer for CCNA Security Chapter 9 Test. The answers discussed below has been claimed to be 100% correct. All the questions are based on CCNAS v1.1. Hopefully, the questions and answers provided below will be a good reference for all of us.
In which phase of the system development life cycle should security requirements be addressed?
Add security requirements during the initiation phase.
Include a minimum set of security requirements at each phase.
Apply critical security requirements during the implementation phase.
Implement the majority of the security requirements at the acquisition phase.
Which type of analysis uses a mathematical model that assigns a monetary figure to the value of assets, the cost of threats being realized, and the cost of security implementations?
Qualitative Risk Analysis
Quantitative Risk Analysis
Qualitative Asset Analysis
Quantitative Continuity Analysis
Which term describes a completely redundant backup facility, with almost identical equipment to the operational facility, that is maintained in the event of a disaster?
backup site
cold site
hot site
reserve site
Which network security test requires a network administrator to launch an attack within the network?
network scan
password crack
penetration test
vulnerability scan
Which three documents comprise the hierarchical structure of a comprehensive security policy for an organization? (Choose three.)
backup policy
server policy
incident policy
governing policy
end-user policy
technical policy
Which three detailed documents are used by security staff for an organization to implement the security policies? (Choose three.)
asset inventory
best practices
guidelines
procedures
risk assessment
standards
What are the two major components of a security awareness program? (Choose two.)
awareness campaign
security policy development
security solution development
self-defending network implementation
training and education
When an organization implements the two-person control principle, how are tasks handled?
A task requires two individuals who review and approve the work of each other.
A task is broken down into two parts, and each part is assigned to a different individual.
A task must be completed twice by two operators who must achieve the same results.
A task is rotated among individuals within a team, each completing the entire task for a specific amount of time.
Which component of the security policy lists specific websites, newsgroups, or bandwidth-intensive applications that are not allowed on the company network?
remote access policies
acceptable use policies
incident handling procedures
identification and authentication policies
Which security document includes implementation details, usually with step-by-step instructions and graphics?
guideline document
standard document
procedure document
overview document
Which option describes ethics?
Ethics is a standard that is higher than the law.
Ethics involves government agencies enforcing regulations.
Ethics compliance is the basis for setting security policies.
Ethics deals with criminal law and monetary compensation.
In the Cisco SecureX architecture, which component is considered the workhorse of policy enforcement?
next-generation endpoint
policy management console
scanning engine
Security Intelligence Operations
Which development has contributed most to the growing demand for a borderless network?
consumer endpoints
DMZ services
corporate managed laptops
personal firewall software
Which aspect of a scanning element is able to determine a security policy to apply based on information such as the person using the device, the location of the device, and the application being used?
context awareness
perimeter awareness
centralized enforcement
perimeter deployment
A company is considering implementing the Cisco SecureX security architecture. What is the purpose of Cisco TrustSec?
It is a technology that implements packet tagging to allow security elements to share information from scanning elements.
It is a large cloud-based security ecosystem with global correlation.
It is a stand-alone appliance managed from a central policy console.
It is a perimeter-based, stand-alone network scanning device.
Which statement about network security within the SecureX architecture is true?
It is located closer to the end user.
It is implemented in the network core.
It is enforced in a highly centralized structure.
It is managed by a single policy.
Which Cisco SecureX product family would be primarily responsible for detecting and blocking attacks and exploits, while preventing intruder access?
secure e-mail and web
secure access
secure mobility
secure data center
secure network
Which SecureX product family would include Cisco AnyConnect?
secure network
secure e-mail and web
secure access
secure mobility
secure data center
If a web browser is to be used, and not a hardware or software-based client, which Cisco solution is best for establishing a secure VPN connection?
VPN Services for Cisco ASA Series
Cisco Adaptive Wireless IPS Software
Cisco AnyConnect Secure Mobility Solutions
Cisco Virtual Security Gateway
Which Cisco secure access solution can be used to determine if hosts are compliant with security policies?
Network Admission Control Appliance
Cisco Secure Access Control System
Cisco AnyConnect Secure Mobility Solutions
Cisco Adaptive Wireless IPS Software
What protocol is used by SCP for secure transport?
IPSec
HTTPS
SSH
Telnet
TFTP
If you unable to achieve 100% mark for this CCNA Security Chapter 9 Test following all questions and answers given above please leave your comment below. We do appreciate any correction you provided or any new and updated questions. With all the knowledge that we shared, hopefully it will benefits all of us.
Credit: All questions and answers for CCNA Security Chapter 9 provided by Xase. All credits goes to him.
CCNA Security Chapter 9 v1.2
[by John]
A network engineer is using a Cisco ASA as a proxy device to provide remote secure access to a company web server. What technology is being used?
Cisco AnyConnect Secure Mobility Client with SSL
Cisco Secure Mobility Clientless SSL VPN
Cisco VPN Client
generic routing encapsulation tunnel using Ipsec
What is a characteristic of ASA security levels?
The lower the security level on an interface, the more trusted the interface.
An ACL needs to be configured to explicitly permit traffic from an interface with a lower security level to an interface with a higher security level.
Each operational interface must have a name and be assigned a security level from 0 to 200.
Inbound traffic is identified as the traffic moving from an interface with a higher security level to an interface with a lower security level.
Refer to the exhibit. Two types of VLAN interfaces were configured on an ASA 5505 with a Base license. The administrator wants to configure a third VLAN interface with limited functionality. Which action should be taken by the administrator to configure the third interface?
The administrator needs to acquire the Security Plus license, because the Base license does not support the proposed action.
The administrator configures the third VLAN interface the same way the other two were configured, because the Base license supports the proposed action.
The administrator must enter the no forward interface vlan command before the nameif command on the third interface.
Because the ASA 5505 does not support the configuration of a third interface, the administrator cannot configure the third VLAN.
What command defines a DHCP pool that uses the maximum number of DHCP client addresses available on an ASA 5505 that is using the Base license?
CCNAS-ASA(config)# dhcpd address 192.168.1.10-192.168.1.100 inside
CCNAS-ASA(config)# dhcpd address 192.168.1.25-192.168.1.56 inside
CCNAS-ASA(config)# dhcpd address 192.168.1.20-192.168.1.50 inside
CCNAS-ASA(config)# dhcpd address 192.168.1.30-192.168.1.79 inside
Which statement describes the function provided to a network administrator who uses the Cisco Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start application?
The administrator can connect to and manage multiple ASA devices, Cisco routers, and Cisco switches.
The administrator can connect to and manage multiple ASA devices.
The administrator can connect to and manage multiple ASA devices and Cisco routers.
The administrator can connect to and manage a single ASA.
Which two statements are true about ASA standard ACLs? (Choose two.)
They identify only the destination IP address.
They are the most common type of ACL.
They are typically only used for OSPF routes.
They are applied to interfaces to control traffic.
They specify both the source and destination MAC address.
What is the purpose of the webtype ACLs in an ASA?
to inspect outbound traffic headed towards certain web sites
to restrict traffic that is destined to an ASDM
to filter traffic for clientless SSL VPN users
to monitor return traffic that is in response to web server requests that are initiated from the inside interface
Refer to the exhibit. A network administrator is configuring PAT on an ASA device to enable internal workstations to access the Internet. Which configuration command should be used next?
nat (inside,outside) dynamic NET1
nat (outside,inside) dynamic interface
nat (inside,outside) dynamic interface
nat (outside,inside) dynamic NET1
[by Jaime]
Which Cisco VPN solution provides limited access to internal network resources by utilizing a Cisco ASA and provides browser-based access only?
SSL
clientless SSL VPN
IPsec
client-based SSL VPN
The following Questions has been answered on CCNA Security Chapter 10 Test v1.1
Which three security features do ASA models 5505 and 5510 support by default? (Choose three.)
Which three components must be configured when implementing a clientless SSL VPN on an ASA 5505 device? (Choose three.)
When the ASA recognizes that the incoming packets are part of an already established connection, which three fast path tasks are executed? (Choose three.)
Refer to the exhibit. Which three sets of configuration commands were entered on the ASA 5505? (Choose three.)
Which option lists the ASA adaptive security algorithm session management tasks in the correct order?
The following questions has been answered on CCNA Security Final Exam v1.1
Refer to the exhibit. The indicated window has appeared in the web browser of a remote user. What is the cause of this message?
Sales representatives of an organization use computers in hotel business centers to occasionally access corporate e-mail and the inventory database. What would be the best VPN solution to implement on an ASA to support these users?
[by abu7ala1]
Refer to the exhibit. A network administrator is configuring an object group on an ASA device. Which configuration keyword should be used after the object group nameSERVICE1?
ip
tcp
udp
icmp
Refer to the exhibit. A network administrator has configured NAT on an ASA device. What type of NAT is used?
inside NAT
bidirectional NAT
outside NAT
static NAT
[by Carlos Sulca]
Refer to the exhibit. An administrator has entered the indicated commands on an ASA 5505. Based on the information presented, what type of remote access VPN has the administrator configured?
an SSL or IPsec(IKEv2) VPN via a Cisco VPN Client
an IPsec(IKEv1) VPN via a web browser
a clientless SSL VPN via a web browser
a clientless SSL VPN via the Cisco AnyConnect Client
an IPsec(IKEv1) VPN via the Cisco VPN Client
an SSL or IPsec(IKEv2) VPN via the Cisco AnyConnect Client
[ref: Chapter 10 Test v1.1]
Which three components must be configured when implementing a clientless SSL VPN on an ASA 5505 device? (Choose three.)
connection profile name
bookmark lists
group policy
Refer to the exhibit. Which three sets of configuration commands were entered on the ASA 5505? (Choose three.)
interface e0/0
switchport access vlan 2
no shut
exit
interface vlan 2
nameif outside
security-level 0
ip address 209.165.200.226 255.255.255.248
route outside 0.0.0.0 0.0.0.0 209.165.200.225
Which option lists the four steps to configure the Modular Policy Framework on an ASA?
1) Configure extended ACLs to identify specific granular traffic. This step may be optional.
2) Configure the class map to define interesting traffic.
3) Configure a policy map to apply actions to the identified traffic.
4) Configure a service policy to identify which interface should be activated for the service.
Which three security features do ASA models 5505 and 5510 support bydefault? (Choose three.)
stateful firewall
intrusion prevention system
VPN concentrator
Which option lists the ASA adaptive security algorithm session management tasks in the correct order?
1) performing the access list checks
2) performing route lookups
3) allocating NAT translations (xlates)
4) establishing sessions in the “fast path”
[by LB]
Refer to the exhibit. According to the command output, which three statements are true about the DHCP options entered on the ASA 5505? (Choose three.)
The dhcpd auto-config outside command was issued to enable the DHCP client.
The dhcpd enable inside command was issued to enable the DHCP server.
The dhcpd address [start-of-pool]-[end-of-pool] inside command was issued to enable the DHCP client.
The dhcpd address [start-of-pool]-[end-of-pool] inside command was issued to enable the DHCP server.
The dhcpd auto-config outside command was issued to enable the DHCP server.
The dhcpd enable inside command was issued to enable the DHCP client.
[Updated by A Smith]
Refer to the exhibit. An administrator has configured an ASA 5505 as indicated but is still unable to ping the inside interface from an inside host. What is the cause of this problem?
VLAN 1 should be the outside interface and VLAN 2 should be the inside interface.
The no shutdown command should be entered on interface Ethernet 0/1. (Confirmed by DaenerysTargaryen)
The security level of the inside interface should be 0 and the outside interface should be 100.
An IP address should be configured on the Ethernet 0/0 and 0/1 interfaces.
VLAN 1 should be assigned to interface Ethernet 0/0 and VLAN 2 to Ethernet 0/1.
[Updated by Muraha Laydum and Andersson, J]
Refer to the exhibit. What will be displayed in the output of the show running-config object command after the exhibited configuration commands are entered on an ASA 5505?
host 192.168.1.4
host 192.168.1.3
range 192.168.1.10 192.168.1.20
host 192.168.1.3, host 192.168.1.4, and range 192.168.1.10 192.168.1.20
host 192.168.1.4 and range 192.168.1.10 192.168.1.20
host 192.168.1.3 and host 192.168.1.4
[Updated by Andersson, J]
Which three wizards are included in Cisco ASDM 6.4? (Choose three.)
ADSL Connection wizard
Advanced Firewall wizard
High Availability and Scalability wizard
Security Audit wizard
Startup wizard
VPN wizard
Which three types of remote access VPNs are supported on ASA devices?
Clientless SSL VPN using the Cisco AnyConnect Client
Clientless SSL VPN using a web browser
IPsec (IKEv1) VPN using the Cisco VPN Client
IPsec (IKEv1) VPN using a web browser
SSL or IPsec (IKEv2) VPN using the Cisco AnyConnect Client
SSL or IPsec (IKEv2) VPN using the Cisco VPN Client
[by Valeria]
A network administrator is configuring the security level for the ASA. What is a best practice for assigning the security level on the three interfaces?
Outside 100, Inside 10, DMZ 40
Outside 0, Inside 100, DMZ 50
Outside 40, Inside 100, DMZ 0
Outside 0, Inside 35, DMZ 90
When dynamic NAT on an ASA is being configured, what two parameters must be specified by network objects? (Choose two.)
the inside NAT interface
the outside NAT interface
the pool of public global addresses
a range of private addresses that will be translated
the interface security level
100 %
All answers are 100% correct. Thanks friend.
thank you I just finish the exam it is still 100% correct.
V1.2 new question, from CCNA 4 chapter 7
Which Cisco VPN solution provides limited access to internal network resources by utilizing a Cisco ASA and provides browser-based access only?
SSL
*clientless SSL VPN*
IPsec
client-based SSL VPN
Thanks Jamie
From v1.2:
A network engineer is using a Cisco ASA as a proxy device to provide remote secure access to a company web server. What technology is being used?
– Cisco AnyConnect Secure Mobility Client with SSL
– *Cisco Secure Mobility Clientless SSL VPN*
– Cisco VPN Client
– generic routing encapsulation tunnel using Ipsec
What is a characteristic of ASA security levels?
– The lower the security level on an interface, the more trusted the interface.
– *An ACL needs to be configured to explicitly permit traffic from an interface with a lower security level to an interface with a higher security level.*
– Each operational interface must have a name and be assigned a security level from 0 to 200.
– Inbound traffic is identified as the traffic moving from an interface with a higher security level to an interface with a lower security level.
Refer to the exhibit. Two types of VLAN interfaces were configured on an ASA 5505 with a Base license. The administrator wants to configure a third VLAN interface with limited functionality. Which action should be taken by the administrator to configure the third interface?
– The administrator needs to acquire the Security Plus license, because the Base license does not support the proposed action.
– The administrator configures the third VLAN interface the same way the other two were configured, because the Base license supports the proposed action.
– *The administrator must enter the no forward interface vlan command before the nameif command on the third interface.*
– Because the ASA 5505 does not support the configuration of a third interface, the administrator cannot configure the third VLAN.
What command defines a DHCP pool that uses the maximum number of DHCP client addresses available on an ASA 5505 that is using the Base license?
– CCNAS-ASA(config)# dhcpd address 192.168.1.10-192.168.1.100 inside
– *CCNAS-ASA(config)# dhcpd address 192.168.1.25-192.168.1.56 inside*
– CCNAS-ASA(config)# dhcpd address 192.168.1.20-192.168.1.50 inside
– CCNAS-ASA(config)# dhcpd address 192.168.1.30-192.168.1.79 inside
Which statement describes the function provided to a network administrator who uses the Cisco Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start application?
– The administrator can connect to and manage multiple ASA devices, Cisco routers, and Cisco switches.
– The administrator can connect to and manage multiple ASA devices.
– The administrator can connect to and manage multiple ASA devices and Cisco routers.
– *The administrator can connect to and manage a single ASA.*
Which two statements are true about ASA standard ACLs? (Choose two.)
– *They identify only the destination IP address.*
– They are the most common type of ACL.
– *They are typically only used for OSPF routes.*
– They are applied to interfaces to control traffic.
– They specify both the source and destination MAC address.
What is the purpose of the webtype ACLs in an ASA?
– to inspect outbound traffic headed towards certain web sites
– to restrict traffic that is destined to an ASDM
– *to filter traffic for clientless SSL VPN users*
– to monitor return traffic that is in response to web server requests that are initiated from the inside interface
Refer to the exhibit. A network administrator is configuring PAT on an ASA device to enable internal workstations to access the Internet. Which configuration command should be used next?
– nat (inside,outside) dynamic NET1
– nat (outside,inside) dynamic interface
– *nat (inside,outside) dynamic interface*
– nat (outside,inside) dynamic NET1
Thank you John. Post updated
Refer to the exhibit. A network administrator is configuring an object group on an ASA device. Which configuration keyword should be used after the object group nameSERVICE1?
ip
**tcp** Correct Answer
udp
icmp
Refer to the exhibit. A network administrator has configured NAT on an ASA device. What type of NAT is used?
**inside NAT** Correct Answer
bidirectional NAT
outside NAT
static NAT
Thanks abu7ala1. Your questions and answers has been updated
Which option lists the ASA adaptive security algorithm session management tasks in the correct order?
1) performing the access list checks
2) performing route lookups
3) allocating NAT translations (xlates)
4) establishing sessions in the “fast path”
Which three security features do ASA models 5505 and 5510 support bydefault? (Choose three.)
stateful firewall
intrusion prevention system
VPN concentrator
Which option lists the four steps to configure the Modular Policy Framework on an ASA?
1) Configure extended ACLs to identify specific granular traffic. This step may be optional.
2) Configure the class map to define interesting traffic.
3) Configure a policy map to apply actions to the identified traffic.
4) Configure a service policy to identify which interface should be activated for the service.
Refer to the exhibit. Which three sets of configuration commands were entered on the ASA 5505? (Choose three.)
-interface e0/0
switchport access vlan 2
no shut
exit
-interface vlan 2
nameif outside
security-level 0
ip address 209.165.200.226 255.255.255.248
-route outside 0.0.0.0 0.0.0.0 209.165.200.225
Which three components must be configured when implementing a clientless SSL VPN on an ASA 5505 device? (Choose three.)
connection profile name
bookmark lists
group policy
Refer to the exhibit. An administrator has entered the indicated commands on an ASA 5505. Based on the information presented, what type of remote access VPN has the administrator configured?
a clientless SSL VPN via a web browser
(Refer Chapter 10 Exam v1.1)
Thank you Carlos.. All your question and answer has been updated. However, we really appreciate if u included all answer options instead only the correct answer. Should you have the exhibit image, please do not hesitate to email me [email protected]. Thanks again
I couldnt find the the fallowing question.
Refer to the exhibit. According to the command output, which three statements are true about the DHCP options entered on the ASA 5505? (Choose three.)
*The dhcpd auto-config outside command was issued to enable the DHCP client.
*The dhcpd enable inside command was issued to enable the DHCP server.
The dhcpd address [start-of-pool]-[end-of-pool] inside command was issued to enable the DHCP client.
*The dhcpd address [start-of-pool]-[end-of-pool] inside command was issued to enable the DHCP server.
The dhcpd auto-config outside command was issued to enable the DHCP server.
The dhcpd enable inside command was issued to enable the DHCP client.
Ps: I couldnt find the attached files button as well 😉
Thank you LB. Question updated. By the way, u can always email me if u have the exhibit. [email protected]
Refer to the exhibit. According to the command output, which three statements are true about the DHCP options entered on the ASA 5505? (Choose three.)
* The dhcpd enable inside command was issued to enable the DHCP server.
* The dhcpd address [start-of-pool]-[end-of-pool] inside command was issued to enable the DHCP server.
* The dhcpd auto-config outside command was issued to enable the DHCP client.
Hi guys.. You can find current set question at CCNA Security Chapter 9 v2.0 Thank you
Refer to the exhibit. An administrator has configured an ASA 5505 as indicated but is still unable to ping the inside interface from an inside host. What is the cause of this problem?
VLAN 1 should be the outside interface and VLAN 2 should be the inside interface.
The no shutdown command should be entered on interface Ethernet 0/1.
The security level of the inside interface should be 0 and the outside interface should be 100.
An IP address should be configured on the Ethernet 0/0 and 0/1 interfaces.
VLAN 1 should be assigned to interface Ethernet 0/0 and VLAN 2 to Ethernet 0/1.
I didn’t know this one. Where is the attach button?
for image, you may send me email [email protected]
I think the answer was “no shutdown on Ethernet 0/1” but this doesn’t really make sense to me with the picture.
Thanks. Question and answer updated
Refer to the exhibit. What will be displayed in the output of the show running-config object command after the exhibited configuration commands are entered on an ASA 5505?
host 192.168.1.4
host 192.168.1.3
>>>>>range 192.168.1.10 192.168.1.20<<<<<<
host 192.168.1.3, host 192.168.1.4, and range 192.168.1.10 192.168.1.20
host 192.168.1.4 and range 192.168.1.10 192.168.1.20
host 192.168.1.3 and host 192.168.1.4
Thanks Muraha. Question updated
When the ASA recognizes that the incoming packets are part of an already established connection, which three fast path tasks are executed? (Choose three.)
**adjusting Layer 3 and Layer 4 headers**
allocating NAT translations (xlates)
**performing IP checksum verification**
performing route lookups
**performing TCP sequence number checks**
performing the access list checks
Thanks. Questions already appear in Chapter 10 v1.1 https://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/
Which three wizards are included in Cisco ASDM 6.4? (Choose three.)
ADSL Connection wizard
Advanced Firewall wizard
**High Availability and Scalability wizard**
Security Audit wizard
**Startup wizard**
**VPN wizard**
Thanks.. Updated. Question also appears in chapter 10 test v1.1
Refer to the exhibit. What will be displayed in the output of the show running-config object command after the exhibited configuration commands are entered on an ASA 5505?
host 192.168.1.3
host 192.168.1.4
**range 192.168.1.10 192.168.1.20**
host 192.168.1.3 and host 192.168.1.4
host 192.168.1.4 and range 192.168.1.10 192.168.1.20
host 192.168.1.3, host 192.168.1.4, and range 192.168.1.10 192.168.1.20
Thank you. Question updated
Which three types of remote access VPNs are supported on ASA devices?
Clientless SSL VPN using the Cisco AnyConnect Client
**Clientless SSL VPN using a web browser**
**IPsec (IKEv1) VPN using the Cisco VPN Client**
IPsec (IKEv1) VPN using a web browser
**SSL or IPsec (IKEv2) VPN using the Cisco AnyConnect Client**
SSL or IPsec (IKEv2) VPN using the Cisco VPN Client
Question updated
Refer to the exhibit. The indicated window has appeared in the web browser of a remote user. What is the cause of this message?
The user has timed out of an AnyConnect SSL VPN installation.
The user has logged out of a clientless SSL VPN session.
The user has logged out of a Cisco VPN Client session.
The user has logged out of an AnyConnect IPsec VPN session.
**The user has logged out of an AnyConnect SSL VPN session.**
Thanks. Similar question appear on https://www.invialgo.com/2012/answer-ccna-security-final-exam-ccnas-v1-1/
correct answer is :
The user has logged out of a clientless SSL VPN session.
The good answer is :
“The user has logged out of a clientless SSL VPN session.”
@networkguy and @Wensen, thanks for correct answer. Others, this question has been appeared before and updated. Please have a look at https://www.invialgo.com/2012/answer-ccna-security-final-exam-ccnas-v1-1/
Sales representatives of an organization use computers in hotel business centers to occasionally access corporate e-mail and the inventory database. What would be the best VPN solution to implement on an ASA to support these users?
client-based IPsec VPN using Cisco VPN Client
client-based IPsec VPN using AnyConnect
client-based SSL VPN using AnyConnect
clientless SSL VPN using a web browser
site-to-site IPsec VPN
***clientless IPsec VPN using a web browser***
Sorry,
answer: clientless SSL VPN using a web browser
The question and answer has been appeared on Final Exam v1.1. Thanks anyway
Refer to the exhibit. An administrator has configured an ASA 5505 as indicated but is still unable to ping the inside interface from an inside host. What is the cause of this problem?
The no shutdown command should be entered on interface Ethernet 0/1.
I confirm this answer… Recently I passed the test with 100%
Thank you Daenerys. Updated
A network administrator is configuring the security level for the ASA. What is a best practice for assigning the security level on the three interfaces?
Outside 100, Inside 10, DMZ 40
*Outside 0, Inside 100, DMZ 50
Outside 40, Inside 100, DMZ 0
Outside 0, Inside 35, DMZ 90
Thanks Valeria. Question and asnwer updated
When dynamic NAT on an ASA is being configured, what two parameters must be specified by network objects? (Choose two.)
the inside NAT interface
the outside NAT interface
*the pool of public global addresses
*a range of private addresses that will be translated
the interface security level
Thank you. Question and answer updated
Sales representatives of an organization use computers in hotel business centers to occasionally access corporate e-mail and the inventory database. What would be the best VPN solution to implement on an ASA to support these users?
client-based SSL VPN using AnyConnect
site-to-site IPsec VPN
clientless IPsec VPN using a web browser
>>clientless SSL VPN using a web browser (correct answer)
client-based IPsec VPN using AnyConnect
client-based IPsec VPN using Cisco VPN Client
Hi. Your question has been answered at Chapter 9 Version 1.1. For Latest question and answers, you may refer to Chapter 9 v2.0