[Free] 2017(Aug) CollectDumps Passguide Cisco 500-258 Dumps with VCE and PDF 21-30

CollectDumps 2017 Aug Cisco Official New Released 500-258
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/500-258.html

Cisco ASA Express Security

Question No: 21

In which two form factors is PRSM available? (Choose two.)

  1. Physical Appliance

  2. Microsoft V-Hyper Virtual Appliance

  3. VMware Virtual Appliance

  4. Citrix XenServer Virtual Appliance

  5. Web Services Application

Answer: A,C

Question No: 22

Which component determines the number of required PRMS licenses?

  1. AVC seats

  2. WSE seats

  3. IPS for NGFW modules

  4. ASAs

Answer: D

Question No: 23

Which statement best describes application recognition on the Cisco ASA NGFW?

  1. Application recognition is based only on signatures that are constantly updated, which are usually released at a monthly cadence.

  2. Application recognition is based on signatures, heuristics, and content scanning, which removes the need to tie applications to ports.

  3. Application recognition is based on custom signatures based on URL, FQDN, user agent strings in the HTTP stream, and IP addresses and ports.

  4. Application recognition is based on PRSM that supports quick filtering capabilities to search for a particular application.

Answer: B

Question No: 24

The Cisco ASA software image has been erased from flash memory. Which two statements about the process to recover the Cisco ASA software image are true? (Choose two.)

  1. Access to the ROM monitor mode is required.

  2. The Cisco ASA appliance must have connectivity to the TFTP server where the Cisco ASA image is stored through the Management 0/0 interface.

  3. The copy tftp flash command is necessary to start the TFTP file transfer.

  4. The server command is necessary to set the TFTP server IP address.

  5. Cisco ASA password recovery must be enabled.

Answer: A,D

Question No: 25

Refer to the exhibit.

Collectdumps 2017 PDF and VCE

A new NOC engineer, while viewing a real-time log from an SSL VPN tunnel, has a question about a line in the log.

The IP address 172.26.26.30 is attached to which interface in the network?

  1. the Cisco ASA physical interface

  2. the physical interface of the end user

  3. the Cisco ASA SSL VPN tunnel interface

  4. the SSL VPN tunnel interface of the end user

Answer: B

Question No: 26

Refer to the exhibit.

Collectdumps 2017 PDF and VCE

When the user quot;contractorquot; Cisco AnyConnect tunnel is established, what type of Cisco ASA user restrictions are applied to the tunnel?

  1. full restrictions (no Cisco ASDM, no CLI, no console access)

  2. full restrictions (no read, no write, no execute permissions)

  3. full restrictions (CLI show commands and Cisco ASDM monitoring permissions only)

  4. full access with no restrictions

Answer: D

Question No: 27

How is the NGFW AVC subscription licensed?

  1. term

  2. seat

  3. application

  4. session

Answer: A

Question No: 28

Refer to the exhibit.

Collectdumps 2017 PDF and VCE

After a remote user established a Cisco AnyConnect session from a wireless card through the Cisco ASA appliance of a partner to a remote server, the user opened the Cisco AnyConnect VPN Client Statistics Details screen.

What are the two sources of the IP addresses that are marked A and B? (Choose two.)

  1. IP address that is assigned to the wireless Ethernet adapter of the remote user

  2. IP address that is assigned to the remote user from the Cisco ASA address pool

  3. IP address of the Cisco ASA physical interface of the partner

  4. IP address of the Cisco ASA virtual HTTP server of the partner

  5. IP address of the default gateway router of the remote user

  6. IP address of the default gateway router of the partner

Answer: B,C

Question No: 29

Your IT department needs to run a custom-built TCP application within the clientless SSL

VPN tunnel. The network administrator suggests running the smart tunnel application. Which three statements concerning smart tunnel applications are true? (Choose three.)

  1. They support active FTP and other RTSP-based applications.

  2. They do not require administrator privileges on the remote system.

  3. They require the enabling of port forwarding.

  4. They are supported on Windows and MAC OS X platforms.

  5. They support native client applications over SSL VPN.

  6. They require the modification of the Host file on the end-user PC.

Answer: B,D,E

Question No: 30

Which option is the typical web reputation range for sites that tend to be well managed, responsible content syndication networks, and user-generated content sites?

A. -10 to -6

  1. -6 to -3

  2. -3 to 3

  3. 0 to 5

  4. 5 to 10

Answer: C

100% Free Download!
Download Free Demo:500-258 Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps 500-258 Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE