Module 21 Flashcards

1
Q

What are examples of the ASA command line interface being similar to the router IOS?

A

-Command prompts are similar
-Supports abbreviation of commands and keywords
-Use of the Tab key to complete a partial command
-Use of the help key (?) after a command to view more syntax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ASA 5506-X with FIREPOWER Services ships with a default config that is sometimes sufficient for?

A

Basic SOHO deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are different ways config changes can be made with ASAs?

A

-Manually using CLI
-Interactively using CLI Setup Initialization wizard
-Using the Adaptive Security Device Manager (ASDM) setup wizard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can an ASA be restored to its factory default global config mode command?

A

By using the configure factory-default global config mode command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the privileged EXEC password automatically configured with?

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What must happen in order for a stronger encryption using AES to be enabled?

A

A primary passphrase must e configured and AES encryption must be enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command is used to change the primary passphrase?

A

key config-key password-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the G1/1 interface frequently configured as on the ASA?

A

The outside interface to the ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the basic configurations of interfaces on the ASA?

A

IP addressing, naming, and setting the security level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a BVI (bridged virtual interfaces)?

A

Interfaces grouped together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can you do with a BVI?

A

You can configure it with a single name and IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Do you still need to configure other settings on individual interfaces in a BVI?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are ways interfaces can be configured with addresses?

A

Manually, by DHCP, or over PPPoE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens when an interface is configured with DHCP on an ASA?

A

A default route from an upstream device can automatically be configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When must a default route be manually configured on an ASA?

A

If DHCP is not configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What connections can ASA be configured to accept for remote management on an ASA?

A

Connections over Telnet or SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are objects?

A

reusable components for use in configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How are objects used?

A

They make it easy to maintain configurations in the place of inline IP addresses, services, names, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How do objects make it easy to maintain configurations?

A

It can be modified in one place and the change will be reflected in all other places that are referencing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the two types of objects?

A

Network objects and service objects

21
Q

What do network objects include?

A

-Host addresses
-Subnets
-Ranges of addresses
-FQDNs (fully qualified domain name)

22
Q

What do service objects refer to?

A

Different network services and protocols

23
Q

What are object groups?

A

Collection of objects that are related

24
Q

Where can network objects groups be used?

A

In configurations including ACLs and NAT

25
Q

What are the five types of objects groups?

A

Network
User
Service
ICMP-Type
Security

26
Q

How many values can objects hold?

A

One

27
Q

How many values can object groups hold?

A

Multiple values, including in-line values as well as previously created objects

28
Q

How do ACLs control access in a network?

A

By preventing defined traffic from entering or exiting

29
Q

How do ASA ACLs different from IOS ACLs?

A

They use network masks rather than wildcard masks

30
Q

What are the five types of ACLs?

A

-Extended access list
-Standard access list
-EtherType access list
-Webtype access list
-IPv6 access list

31
Q

All ASA ACLs are named. (T/F)

A

True

32
Q

How can ASA ACLs be used with object groups?

A

They can be used to limit the number of ACEs that are required in a list

33
Q

What are the three types of deployment methods?

A

-Inside NAT
-Outside NAT
-Bidirectional NAT

34
Q

What is inside NAT used for?

A

For translating inside addresses on secure networks to outside addresses on less secure networks

35
Q

What is outside NAT?

A

traffic from a lower security network is translated for a higher security network

36
Q

What is outside NAT used for?

A

To make internal enterprise hosts available to outside users

37
Q

What is Bidirectional NAT?

A

Inside and outside NAT together

38
Q

What are the four types of NAT that ASA supports?

A

-Dynamic NAT with overload
-Static NAT
-Policy NAT
-Identity NAT

39
Q

What must be used to configure NAT?

A

Network objects

40
Q

What do ASA device not support without using AAA?

A

Local authentication

41
Q

Cisco ASAs can be configured to authenticate access using..?

A

Local user database or an external server for authentication or both

42
Q

What does Server-based AAA authentication use?

A

AN external database server by leveraging the Radius or TACACS+ protocols

43
Q

What does MPF configuration (Modular Policy Framework) do?

A

defines a set of rules for applying firewall features such as traffic inspection and QoS, to the traffic that traverses the ASA

44
Q

MPF allows..

A

detailed classification of traffic flows to apply different advanced policies to different flows

45
Q

What are class maps used for?

A

To identify traffic that will be processed by MPF

46
Q

What do Policy maps do?

A

They define what will be done to the identified traffic

47
Q

What do Service policies do?

A

They identify which interfaces the policy map should be applied to

48
Q

What layers does the ASA support

A

Layer 5 to Layer 7

49
Q

How might the ASA MPF feature be used?

A

To match HTTP URLs and request methods, prevent users from surfing to specific sites during specific times, or prevent users from downloading music and video files via HTTP/FTP or HTTPS/SFTP