Configuring Basic Firewall Policies on Cisco ASA Flashcards

1
Q

Name three features the Cisco ASA provides?

A

Simple packet filtering using standard or extended access lists, Layer 2 transparent implementation,
Support for remote-access SSL VPN connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Cisco ASA models are designed for small and branch offices?

A

5505, 5512-x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When used in an access policy, which component could identify multiple servers?

A

Object groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an accurate description of the word inbound as it relates to an ASA?

A

Traffic from a device that is located on a low-security interface, Traffic that is exiting any interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When is traffic allowed to be routed and forwarded if the source of the traffic is from a device located off of a low-security interface if the destination device is located off of a high-security interface?

A

This traffic is allowed if the initial traffic was inspected and this traffic is the return traffic, If there is an access list that is permitting this traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What tools could be used to configure or manage an ASA?

A

CSM, ASDM, CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name an element, which is part of the Modular Policy Framework on the ASA, are used to classify traffic?

A

Class maps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When you configure the ASA as a DHCP server for a small office, what default gateway will be assigned for the DHCP clients to use?

A

The ASAs inside IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When you configure network address translation for a small office, devices on the Internet will see the ASA inside users as coming from which IP address?

A

The outside address of the ASA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You’re interested in verifying whether the security policy you implemented is having the desired effect. How can you verify this policy without involving end users or their computers?

A

Use the Packet Tracer tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly