A Cisco ASA appliance has three interfaces configured. The first interface is the inside interface with a security level of 100. The second interface is the DMZ interface with a security level of 50. The third interface is the outside interface with a security level of 0. By default, without any access list configured, which five types of traffic are permitted? (Choose five.)
A.
outbound traffic initiated from the inside to the DMZ
B.
outbound traffic initiated from the DMZ to the outside
C.
outbound traffic initiated from the inside to the outside
D.
inbound traffic initiated from the outside to the DMZ
E.
inbound traffic initiated from the outside to the inside
F.
inbound traffic initiated from the DMZ to the inside
G.
HTTP return traffic originating from the inside network and returning via the outside interface
H.
HTTP return traffic originating from the inside network and returning via the DMZ interface
I.
HTTP return traffic originating from the DMZ network and returning via the inside interface
J.
HTTP return traffic originating from the outside network and returning via the inside interface
The answers are A, B, C, G, and H. This is because traffic from higher level security interfaces can be sent to lower levels without being blocked, but lower level security interfaces cannot send to interfaces with higher security levels. Return traffic that originated from a higher level interface is allowed through from say outside to inside, or DMZ to inside.