1. | What is the relationship between the Cisco PIX Firewall and the AAA server? |
2. | What three methods are used to authenticate to the Cisco PIX Firewall? |
3. | How does the Cisco PIX Firewall process cut-through proxy? |
4. | What are the main differences between RADIUS and TACACS+? |
5. | What patch level must you have Windows 2000 Professional configured to before you install Cisco Secure ACS? |
6. | Why is it important to authenticate a user before you complete authorization? |
7. | What are the three layers of authentication? |
8. | What is the purpose of the Explain button during the Cisco Secure ACS installation? |
9. | What do you need to verify before installing Cisco Secure ACS? |
10. | Why is it important to have Internet Explorer up to date on your Cisco Secure ACS? |
11. | True or false: With authorization configured, cut-through proxy authenticates users and then allows them to connect to anything. |
12. | True or false: The Cisco Secure ACS installation on Windows Server is a relatively simple, wizard-based installation. |