Test1pass Cisco 642-524 free braindumps

  • Exam Number/Code : 642-524
  • Exam Name : Securing Networks with ASA Foundation
  • Questions and Answers : 62 Q&As
  •  

    1. The network security administrator for XYZ Corporation wants to apply specific restrictions to one network user,
    Bob, who works from home and accesses the corporate network from the outside interface of the security appliance.
    The administrator decides to use the downloadable ACL feature of the security appliance to control network access
    for this user. Authentication of inbound traffic is already configured on the security appliance, and Bob already has a
    user account on the Cisco Secure ACS. Which three tasks does the administrator need to complete in order to
    accomplish the goal of limiting network access for Bob via downloadable ACLs? (Choose three.)
    A. Enable inbound authorization on the security appliance.
    B. Configure the security appliance to use downloadable ACLs.
    C. Attach the downloadable ACL to the user profile for Bob on the Cisco Secure ACS.
    D. In the authorization configuration of the security appliance, specify the RADIUS server where the user account for
    Bob resides.
    E. Configure the Cisco Secure ACS to use downloadable ACLs.
    F. Configure the downloadable ACLs on the Cisco Secure ACS.
    Answer: CEF


    2. To require users to authenticate before accessing the corporate DMZ servers, the network security administrator
    needs to configure cut-through proxy authentication via RADIUS. Which three tasks are required to accomplish this
    goal? (Choose three.)
    A. Specify a AAA server group.
    B. Designate an authentication server.
    C. Add users to the local user database.
    D. Configure per-user override.
    E. Configure a rule that specifies which traffic flow to authenticate.
    F. Assign ACLs to users or groups.
    Answer: ABE


    3. Refer to the exhibit. A network administrator wants to authenticate remote users who are accessing the WEB1
    server from the Internet. When a remote user initiates a session to the WEB1 server, the ASA1 security appliance will
    verify the credentials of the user with the TX_ACS AAA server via RADIUS. To accomplish this, the administrator must
    load and configure Cisco Secure ACS software on the TX_ACS AAA server. During the process, the administrator
    must correctly configure the AAA client information in the Cisco Secure ACS network configuration window.
    What must the administrator place in field A (AAA Client Hostname) and field B (AAA Client IP Address)?
    A. ATX_ACS
    B10.0.1.10
    B. AWEB1
    B172.16.1.2
    B172.16.1.2
    C. AASA1
    B10.0.1.1
    D. ABOB
    B192.168.2.10
    Answer: C


    4. Refer to the exhibit. Given the configuration that is shown, what traffic will be logged to the AAA server?
    A. All connection information will be logged in the accounting database.
    B. All outbound TCP connection information will be logged in the accounting database.
    C. Only authenticated and authorized console connection information will be logged in the accounting database.
    D. No information will be logged. This is not a valid configuration because TACACS+ connection information cannot be
    captured and logged.
    Answer: B


    5. Which two of the following statements are true about the local user database in the security appliance? (Choose
    two.)
    A. You can create user accounts with or without passwords in the local database.
    B. The default privilege level for a new user is 15.
    C. You can configure the security appliance to lock a user out after the user meets a configured maximum number of
    failed authentication attempts.
    D. You can use the local database for CLI access authentication, privileged mode authentication, command
    authorization, network access authentication, and network access authorization.
    E. You cannot use the local database for network access authentication.
    F. The enable_16 user is always present in the local user database and represents the default username.
    Answer: AC


    6. Refer to the exhibit. Which two statements accurately describe the effect of the configuration that is shown in the
    exhibit? (Choose two.)
    A. Users will be prompted for a username and password when they start HTTP connections to host 192.168.1.11 from
    the outside.
    B. Users will be prompted for a username and password when they start HTTP connections from the inside to host
    192.168.1.11 on the outside interface.
    C. The security appliance will first contact host 10.0.1.2 on the inside interface for verification of credentials; if host
    10.0.1.2 is unavailable, the security appliance will attempt to authenticate the user via the local user database.
    D. The security appliance will contact a AAA server in the AUTHIN server group for verification of credentials.
    Answer: AD


    7. Refer to the exhibit. Which three commands would verify that the boot image is asa802-k8.bin? (Choose three.)
    A. show disk0:
    B. show bootvar
    C. show startup-config
    D. show asdm image
    E. show device-boot history
    F. show version
    Answer: BCF


    8. Refer to the exhibit. Which two scenarios accurately illustrate the effect of the configuration that is shown in the
    exhibit? (Choose two.)
    A. User addison enters the login command at the > prompt and logs in with the correct username and password when
    prompted. User addison can then enter the global configuration mode on the security appliance.
    B. User carter enters the login command at the > prompt and logs in with the correct username and password when
    prompted. User carter can then enter the global configuration mode on the security appliance.
    C. User carter enters the enable command at the > prompt and logs in with the correct username and password when
    prompted. User carter can then enter the global configuration mode.
    D. User kenny enters the enable command at the > prompt and logs in with the correct username and password when
    prompted. User kenny can then enter the global configuration mode.
    E. User kenny enters the command enable 10 to access privilege level 10 and provides the password for privilege level
    10 when prompted. User kenny can then enter the global configuration mode.
    Answer: AD


    9. You just erased the configuration on your Cisco ASA adaptive security appliance, which has in its flash memory
    one ASA image file (asa802-k8.bin), one ASDM image file (asdm-602.bin), and no configuration files. You want to
    reconfigure the Cisco ASA adaptive security appliance using Cisco ASDM, but you realize that you are unable to
    access Cisco ASDM. Which set of commands provides the minimal configuration that is needed to access Cisco
    ASDM?
    A. interface, nameif, setup (followed by the setup command interactive prompts)
    B. interface, nameif, setup (followed by the setup command interactive prompts), asdm image
    C. interface, nameif, setup (followed by the setup command interactive prompts), http server
    D. setup (followed by the setup command interactive prompts)
    E. interface, nameif, ip address, no shutdown, hostname, domain-name, clock set, http server enable
    F. interface, nameif, ip address, hostname, domain-name, clock set, http server enable, asdm image
    Answer: A


    10. Which two statements accurately describe the downloadable ACL feature of the security appliance? (Choose
    two.)
    A. Downloadable ACLs are the only supported authorization method that works without authentication.
    B. Downloadable ACLs enable you to store full ACLs on a AAA server and download them to the security appliance.
    C. Downloadable ACLs are supported using TACACS+ or RADIUS.
    D. The downloadable ACL must be attached to a user or group profile on a AAA server.
    E. The security appliance supports only per-user ACL authorization.
    F. Downloadable ACLs cannot be manually removed; they must expire based on the configured timeout.
    Answer: BD

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值