Configuring Basic Firewall Policies on Cisco ASA Flashcards Preview

CCNA Security 210-260 > Configuring Basic Firewall Policies on Cisco ASA > Flashcards

Flashcards in Configuring Basic Firewall Policies on Cisco ASA Deck (10)
Loading flashcards...
1
Q

Name three features the Cisco ASA provides?

A

Simple packet filtering using standard or extended access lists, Layer 2 transparent implementation,
Support for remote-access SSL VPN connections

2
Q

Which Cisco ASA models are designed for small and branch offices?

A

5505, 5512-x

3
Q

When used in an access policy, which component could identify multiple servers?

A

Object groups

4
Q

What is an accurate description of the word inbound as it relates to an ASA?

A

Traffic from a device that is located on a low-security interface, Traffic that is exiting any interface

5
Q

When is traffic allowed to be routed and forwarded if the source of the traffic is from a device located off of a low-security interface if the destination device is located off of a high-security interface?

A

This traffic is allowed if the initial traffic was inspected and this traffic is the return traffic, If there is an access list that is permitting this traffic

6
Q

What tools could be used to configure or manage an ASA?

A

CSM, ASDM, CLI

7
Q

Name an element, which is part of the Modular Policy Framework on the ASA, are used to classify traffic?

A

Class maps

8
Q

When you configure the ASA as a DHCP server for a small office, what default gateway will be assigned for the DHCP clients to use?

A

The ASAs inside IP address

9
Q

When you configure network address translation for a small office, devices on the Internet will see the ASA inside users as coming from which IP address?

A

The outside address of the ASA

10
Q

You’re interested in verifying whether the security policy you implemented is having the desired effect. How can you verify this policy without involving end users or their computers?

A

Use the Packet Tracer tool