You are using ASDM to verify a clientless SSL VPN configuration made by a junior administrator on an ASA.
Please click exhibit to answer the following questions.
Exhibit:
Which of the following user accounts will be able to connect to the ASA by using ASDM? (Select the bestanswer.)
A.
only john
B.
only boson
C.
only jane
D.
both john and jane
E.
both jane and boson
F.
john, jane, and boson
Explanation:
Both the jane and the boson user accounts will be able to connect to the Cisco Adaptive Security Appliance
(ASA) by using Cisco Adaptive Security Device Manager (ASDM). When you add a user to the local
Authentication, Authorization, and Accounting (AAA) database on an ASA, you can specify security parameters
for the user. One security option you can specify is whether the user can establish a management connection
to the ASA. This option is configured in the Add or Edit User Account dialog box in ASDM. Under Access
Restriction, you can select Full Access (ASDM, SSH, Telnet and Console), CLI login prompt for SSH, Telnet
and console (no ASDM access), or No ASDM, SSH, Telnet or Console access. The Full Access (ASDM, SSH,
Telnet and Console) option will let the user use ASDM or the command line interface (CLI) to administer the
ASA. In this scenario, this option is selected for both the jane and the boson user accounts, as shown in the
following exhibits:You can access the Add or Edit User Account dialog box in ASDM by clicking Configuration, clicking the
Remote Access VPN button, expanding AAA/Local Users, and clicking Local Users. To open the Edit User
Account dialog box, you should double click the user account that you want to open.
The john user account is configured with the No ASDM, SSH, Telnet or Console access option. This option will
prevent the user from establishing a management connection to the device by using ASDM, SSH, Telnet, or the
console.Cisco: Configuring AAA Servers and the Local Database: Adding a User Account
210-260 PDF Dumps: https://www.braindump2go.com/210-260.html