Module 21 Flashcards

1
Q

What are examples of the ASA command line interface being similar to the router IOS?

A

-Command prompts are similar
-Supports abbreviation of commands and keywords
-Use of the Tab key to complete a partial command
-Use of the help key (?) after a command to view more syntax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ASA 5506-X with FIREPOWER Services ships with a default config that is sometimes sufficient for?

A

Basic SOHO deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are different ways config changes can be made with ASAs?

A

-Manually using CLI
-Interactively using CLI Setup Initialization wizard
-Using the Adaptive Security Device Manager (ASDM) setup wizard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can an ASA be restored to its factory default global config mode command?

A

By using the configure factory-default global config mode command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the privileged EXEC password automatically configured with?

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What must happen in order for a stronger encryption using AES to be enabled?

A

A primary passphrase must e configured and AES encryption must be enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command is used to change the primary passphrase?

A

key config-key password-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the G1/1 interface frequently configured as on the ASA?

A

The outside interface to the ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the basic configurations of interfaces on the ASA?

A

IP addressing, naming, and setting the security level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a BVI (bridged virtual interfaces)?

A

Interfaces grouped together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can you do with a BVI?

A

You can configure it with a single name and IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Do you still need to configure other settings on individual interfaces in a BVI?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are ways interfaces can be configured with addresses?

A

Manually, by DHCP, or over PPPoE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens when an interface is configured with DHCP on an ASA?

A

A default route from an upstream device can automatically be configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When must a default route be manually configured on an ASA?

A

If DHCP is not configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What connections can ASA be configured to accept for remote management on an ASA?

A

Connections over Telnet or SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are objects?

A

reusable components for use in configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How are objects used?

A

They make it easy to maintain configurations in the place of inline IP addresses, services, names, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How do objects make it easy to maintain configurations?

A

It can be modified in one place and the change will be reflected in all other places that are referencing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the two types of objects?

A

Network objects and service objects

21
Q

What do network objects include?

A

-Host addresses
-Subnets
-Ranges of addresses
-FQDNs (fully qualified domain name)

22
Q

What do service objects refer to?

A

Different network services and protocols

23
Q

What are object groups?

A

Collection of objects that are related

24
Q

Where can network objects groups be used?

A

In configurations including ACLs and NAT

25
What are the five types of objects groups?
Network User Service ICMP-Type Security
26
How many values can objects hold?
One
27
How many values can object groups hold?
Multiple values, including in-line values as well as previously created objects
28
How do ACLs control access in a network?
By preventing defined traffic from entering or exiting
29
How do ASA ACLs different from IOS ACLs?
They use network masks rather than wildcard masks
30
What are the five types of ACLs?
-Extended access list -Standard access list -EtherType access list -Webtype access list -IPv6 access list
31
All ASA ACLs are named. (T/F)
True
32
How can ASA ACLs be used with object groups?
They can be used to limit the number of ACEs that are required in a list
33
What are the three types of deployment methods?
-Inside NAT -Outside NAT -Bidirectional NAT
34
What is inside NAT used for?
For translating inside addresses on secure networks to outside addresses on less secure networks
35
What is outside NAT?
traffic from a lower security network is translated for a higher security network
36
What is outside NAT used for?
To make internal enterprise hosts available to outside users
37
What is Bidirectional NAT?
Inside and outside NAT together
38
What are the four types of NAT that ASA supports?
-Dynamic NAT with overload -Static NAT -Policy NAT -Identity NAT
39
What must be used to configure NAT?
Network objects
40
What do ASA device not support without using AAA?
Local authentication
41
Cisco ASAs can be configured to authenticate access using..?
Local user database or an external server for authentication or both
42
What does Server-based AAA authentication use?
AN external database server by leveraging the Radius or TACACS+ protocols
43
What does MPF configuration (Modular Policy Framework) do?
defines a set of rules for applying firewall features such as traffic inspection and QoS, to the traffic that traverses the ASA
44
MPF allows..
detailed classification of traffic flows to apply different advanced policies to different flows
45
What are class maps used for?
To identify traffic that will be processed by MPF
46
What do Policy maps do?
They define what will be done to the identified traffic
47
What do Service policies do?
They identify which interfaces the policy map should be applied to
48
What layers does the ASA support
Layer 5 to Layer 7
49
How might the ASA MPF feature be used?
To match HTTP URLs and request methods, prevent users from surfing to specific sites during specific times, or prevent users from downloading music and video files via HTTP/FTP or HTTPS/SFTP