CCSP SECUR FAQ : Cisco Secure Access Control Server
Q1. Which of the following devices are supported by Cisco Secure ACS?
A. Cisco PIX firewall
B. Cisco Network Access Servers (NAS)
C. Cisco 412
D. Cisco 550
Q2. Which of the following is true about Cisco Secure ACS?
A. Centralizes access control and accounting
B. Centralizes configuration management for routers and switches
C. Is a distributed security application only for firewalls
D. Only supports Cisco products
Q3. Which of the following user repository systems are supported by Cisco?
A. Windows NT/2000 user database
B. Generic LDAP
C. Novell NetWare Directory Services (NDS)
D. CipherTec database
Q4. Which of the following password protocols is not supported by Cisco Secure ACS?
Q5. Which of the following is a feature of the Cisco Secure ACS authorization feature?
A. Denying logins based on time of day and day of week
B. Denying access based on operating system of the client
C. Permitting access based on packet size
D. Permitting access based on the type of encryption used
Q6. Which of the following are the types of accounting logs that can be generated by Cisco Secure ACS?
A. Administrative accounting
B. PAP accounting
C. TACACS+ accounting
D. RADIUS accounting
Q7. Which of the following is not part of the main services/modules that are installed for Cisco Secure ACS for Windows?
Q8. What does the CSMon services do?
A. Provides logging services for both accounting and system activity
B. Provides the HTML interface for administration
C. Provides recording and notification of Cisco Secure ACS performance.
D. Monitors firewall activities
Q9. Authentication and authorization function is handled by which service in the Cisco Secure ACS for Windows?
Q10. Under which condition(s), using the Cisco Secure user database, are users forced to change their password?
A. After a specified number of days
B. After a specified number of logins
C. The first time a new user logs in
Q11. Where does the Cisco Secure ACS write its accounting records?
Q12. Give one example of the user repository that Cisco Secure ACS supports?
Q13. Give one advantage of using Cisco Secure ACS?
Q14. Give two examples of the password protocols that are supported by Cisco Secure ACS?
Q15. Mike is a network administrator at an engineering firm. He would like to restrict access to consultants during the weekend. Can Cisco Secure ACS help Mike?
Q16. What are the core services of Cisco Secure ACS 3.0?
Q17. What is the function of CSAdmin?
Q18. What are some of the databases that Cisco Secure ACS for UNIX supports?
Q19. Which core service of the Cisco Secure ACS for Windows provides synchronization with external RDBMS applications?
Q20. Name two types of accounting logs generated by Cisco Secure ACS