1. | What is the ASA, and how does the Cisco PIX Firewall use it? |
2. | Why does the ASA generate random TCP sequence numbers? |
3. | What components of a TCP session does the ASA write to the state table to create a session object? |
4. | What can cause a session object to be deleted from the state table? |
5. | What are the three ways to initiate a cut-through proxy session? |
6. | What X.509 certificates do SCEP and the PIX Firewall support? |
7. | How many physical interfaces does the PIX 515E support? |
8. | What is the lowest model number of the PIX Firewall family to support failover? |
9. | What are three methods of managing a Cisco PIX Firewall? |
10. | List four advantages of the ASA. |