500-258 - Cisco ASA Express Security

Go back to Cisco

Example Questions

To maintain employee productivity, employee access is restricted based on application, user, device, and location. Which two licenses are needed to allow administrators to enforce company policy? (Choose two.) Which statement about the on-box version of PRSM is true? Which statement describes how users create their own (custom) application signatures with the Cisco ASA NGFW? When preconfiguring a Cisco AnyConnect profile for the user group, which file is output by the Cisco AnyConnect profile editor? A security administrator suspects that an internal system has been infected by malware and communicates with an external server. Which Cisco ASA NGFW license must the administrator have to detect and monitor the unauthorized command and control network traffic? Which three features does the Cisco Meraki Security Appliance offer? (Choose three.) Which Cisco ASA CLI command is used to enable HTTPS (Cisco ASDM) access from any inside host on the subnet? The "HTTPS decryption" feature is enabled with the default settings and decryption and IPS policies have been applied to the traffic. Which statement describes what happens when a client connects to a server with an untrusted certificate? On the Cisco ASA, tcp-map can be applied to a traffic class using which MPF CLI configuration command? Which option is the typical web reputation range for sites that tend to be well managed, responsible content syndication networks, and user-generated content sites? In which two ways is the Cisco ASA CWS subscription licensed? (Choose two.) Which component determines the number of required PRMS licenses? Which two Cisco ASA licensing features are correct with Cisco ASA Software Version 8.3 and later? (Choose two.) In which two form factors is PRSM available? (Choose two.) Which Cisco ASA NGFW license is needed to allow a high-school security administration to implement policy to allow student access to high-reputation sites only? Which three statements about the FirePOWER appliance are true? (Choose three.) The Cisco ASA software image has been erased from flash memory. Which two statements about the process to recover the Cisco ASA software image are true? (Choose two.) Which NGFW component collects user details so that access policies can match traffic based on this information? Which license is required on the Cisco ASA NGFW for an administrator to manage it securely from a remote laptop? How is the NGFW AVC subscription licensed? Which statement best describes application recognition on the Cisco ASA NGFW? You are an NGFW administrator at a local school and want to take appropriate steps to limit exposure to explicit content for students. Which access policy action is the most effective with the least impact? Which option describes what client-based access control enables?