Modular Policy Framework provides a consistent and flexible way to configure security appliance
features in a manner similar to Cisco IOS software QoS CLI. Your company asked you to examine
the current Cisco Modular Policy Framework configurations on the LA-ASA Cisco Adaptive
Security Appliance (ASA) by use of the Cisco Adaptive Security Device Manager (ASDM).
Which two steps should the Cisco Adaptive Security Applicance take on HTTP traffic entering its
outside interface? (Choose two.)
A.
Drops HTTP request messages whose request method is post and whose user-agent field
contains either the string Some_New_P2P_Client1 or the string Some_New_P2P_Client2.
B.
Forwards all HTTP request messages that are permitted by access control lists (ACLs) on the
outside interface.
C.
Logs HTTP request messages whose request method is post and whose user-agent field
contains either the string Some_New_P2P_Client1 or the string Some_New_P2P_Client2.
D.
Drops HTTP request messages whose user-agent field contains the string
Some_New_P2P_Client1 and the string Some_New_P2P_Client2.