Question about : Securing Networks with ASA Foundation (SNAF)

Dear All,
I would like to ask about the exam Securing Networks with ASA Foundation (SNAF) as below:
1- How i can download documents before i take exam? ( i mean did it have offline file?)
2- i was pass CCNA and CCDA already so can i continuous to take this exam?
I try to find ebook and offline file from Cisco website but it don't have....
Please let me know if you know this ...:)
best regards,
Rechard

There's a quick reference book for SNAF. You can find it on the cisco press website. There's also an older book called "Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance". It's from 2005 but it's usefull.
After CCNA I'd recommend you to pass CCNA:Security before you take SNAF. It's needed both for ASA Specialist and for CCSP.
Good luck

Similar Messages

  • Cannot access my own secure network with G4 iBook

    I set up a WPA secure network with a AirPort Extreme Base Station. No problem using it with my G4 iMac. However, when I try to access it with a second computer, a G4 iBook laptop, using the same WPA password I use to access it with my iMac, I get an error message.
    Using the Setup Assistant with the iBook gives me an "invalid password" message. I know it is the correct password. I set it up and I use it with the iMac!
    When the network is unsecured (no password needed) the iBook can access it, no problem.
    Please tell me what I need to do to be able to access my own secure network with my iBook. TIA!

    The only thing I can think of is the firmware for the AirPort card in the iBook, which is version 9.52. I could not find anywhere in Apple's website how to upgrade this. Does anybody know how to upgrade this firmware?
    If there is any firmware update to the card it is done automagically whenever the corresponding AirPort software update is applied. There is no user notification and no way for the user to make updates diretly.

  • A question about a method with generic bounded type parameter

    Hello everybody,
    Sorry, if I ask a question which seems basic, but
    I'm new to generic types. My problem is about a method
    with a bounded type parameter. Consider the following
    situation:
    abstract class A{     }
    class B extends A{     }
    abstract class C
         public abstract <T extends A>  T  someMethod();
    public class Test extends C
         public <T extends A>  T  someMethod()
              return new B();
    }What I want to do inside the method someMethod in the class Test, is to
    return an instance of the class B.
    Normally, I'm supposed to be able to do that, because an instance of
    B is also an instance of A (because B extends A).
    However I cannot compile this program, and here is the error message:
    Test.java:16: incompatible types
    found   : B
    required: T
                    return new B();
                           ^
    1 errorany idea?
    many thanks,

    Hello again,
    First of all, thank you very much for all the answers. After I posted the comment, I worked on the program
    and I understood that in fact, as spoon_ says the only returned value can be null.
    I'm agree that I asked you a very strange (and a bit stupid) question. Actually, during recent months,
    I have been working with cryptography API Core in Java. I understood that there are classes and
    interfaces for defining keys and key factories specification, such as KeySpec (interface) and
    KeyFactorySpi (abstract class). I wanted to have some experience with these classes in order to
    understand them better. So I created a class implementing the interface KeySpec, following by a
    corresponding Key subclass (with some XOR algorithm that I defined myself) and everything was
    compiled (JDK 1.6) and worked perfectly. Except that, when I wanted to implement a factory spi
    for my classes, I saw for the first time this strange method header:
    protected abstract <T extends KeySpec> T engineGetKeySpec
    (Key key, Class<T> keySpec) throws InvalidKeySpecExceptionThat's why yesterday, I gave you a similar example with the classes A, B, ...
    in order to not to open a complicated security discussion but just to explain the ambiguous
    part for me, that is, the use of T generic parameter.
    The abstract class KeyFactorySpi was defined by Sun Microsystem, in order to give to security
    providers, the possibility to implement cryptography services and algorithms according to a given
    RFC (or whatever technical document). The methods in this class are invoked inside the
    KeyFactory class (If you have installed the JDK sources provided by Sun, You can
    verify this, by looking the source code of the KeyFactory class.) So here the T parameter is a
    key specification, that is, a class that implements the interface KeySpec and this class is often
    defined by the provider and not Sun.
    stefan.schulz wrote:
    >
    If you define the method to return some bound T that extends A, you cannot
    return a B, because T would be declared externally at invocation time.
    The definition of T as is does not make sense at all.>
    He is absolutely right about that, but the problem is, as I said, here we are
    talking about the implementation and not the invocation. The implementation is done
    by the provider whereas the invocation is done by Sun in the class KeyFactory.
    So there are completely separated.
    Therefore I wonder, how a provider can finally impelment this method??
    Besides, dannyyates wrote
    >
    Find whoever wrote the signature and shoot them. Then rewrite their code.
    Actually, before you shoot them, ask them what they were trying to achieve that
    is different from my first suggestion!
    >
    As I said, I didn't choose this method header and I'm completely agree
    with your suggestion, the following method header will do the job very well
    protected abstract KeySpec engineGetKeySpec (Key key, KeySpec key_spec)
    throws InvalidKeySpecException and personally I don't see any interest in using a generic bounded parameter T
    in this method header definition.
    Once agin, thanks a lot for the answers.

  • Question about security issues regarding 'cp' and 'mv'

    Ok, I wondered about how 'cp' and 'mv' are really working. I have some guesses but I need these things to be confirmed.
    Here is what I have:
    A partition with a unix file system, say ext2 or 3 (does this make a difference here?) containing *very* sensitive data. The filesystem is encrypted (whirlpool/serpent) but that shouldn't matter. As I do not want corpses of dead files lying around that could be recovered, I always use 'shred -zu' with 26 passes to overwrite and then delete the data.
    And that's where I have my conceirns:
    If I want to rename a file or move it to another folder on the same partition. Is it save to 'mv' it? Or should I 'cp' it and then 'shred' the original file. I assume that 'mv' will not touch the actual file and just tell the file system of it's new name or place in the folder-structure. Given that, shredding a 'mv'ed file should not leave a trace of it on the drive (except of the old filename before the 'mv' maybe, but that wouldn't be too critical). I assume that, because it's the only thing that would make sense to me, but have to know it for sure!
    However, on moving the file to another drive I should probably 'cp' it, then 'shred' the original file. The question I have here is as follows:
    How much information which could be recovered leaves 'cp'ing in my RAM? Will I have to find a way to somehow shred the information in the RAM or can I assume that my RAM get's rewritten often enough, that most traces will be gone, say, in a couple of days?
    If you have links at hand to confirm your answer, please post them, too.

    Okay, thanks for that, I will have a closer look on flushing the ram.
    Sure, I care about security and privacy, but -- as you might expect -- the data I have are not really THAT sensitive/confidential/whatsoever. I've just gotten into it somehow and now I'm just curious/intrested in improving it for it's own sake more or less.

  • Just a question about security

    Hi All.
    Just a simple question really, I read on one of the forums here a question about running windows and apples mac os at the same time.
    My question is: would they not cause conflict, as with apple you don't need to install security but windows is riddled with bugs and virus's surely one would infect the other?
    Sorry to sound so silly,  I'm not very computer savvy , but it strikes me as wrong somehow.
    Thanks Tricia

    You will have whatever threats assail Windows and must protect against those, but none of them will cross over to the Mac side. Note: there is cross platform Windows/Mac malware, i.e. malware written for both. But to be infected you need to be infected directly on the Mac side.
    http://www.zdnet.com/blog/bott/the-slow-and-steady-evolution-of-cross-platform-m alware/4930

  • Question about Logon ticket with user mapping at BI-JAVA environment

    We're implementing BI 7.0 including BI Java and SAP EP for end user
    access.
    I have two question about SSO method when we're using BI Java.
    I know we can simply configure SSO logon ticket with BI-Java(EP
    included) and BI-ABAP through BI template installer and we already
    succeeded in that case.
    But the problem is we want to change it to user mapping SSO method for
    some our internal reason.
    After we configure user mapping SSO, we've got SSO failed error when we
    call BI-Java stuff like BEx Web Application iView.
    After many testing implemented, we found SSO Logon ticket with user
    mapping (using SAP reference system). It seems working now.
    But our question is "Is it no problem when we use SSO logon ticket with
    user mapping?" Is there any restriction or issue?
    One more question is we can ONLY use user base mapping when reference
    system used. How can we assign BI-ABAP users to EP Group?

    Using an SAP Reference system is allright. But if the reason u r going for this is because of different usernames in EP and BI, why dont you go for user mapping.
    Anyways, on restriction of reference syetms is that you can have ONLY ONE reference system defined in portal. In you case you can only have the BI system defined.
    Hope this helps!!

  • Questions about PDF exporting with InDe CS5.5

    Hey all,
    A couple questions about exporting to PDF from the latest version of InDe.
    First, I have noticed that it seems to take a lot longer to get to a PDF. Any suggestions for how to speed up the process? It took 8 minutes or so to generate a low-res PDF (for print) of a 24pp document with a few placed images and vector graphics. Wow, that's a long time to wait, especially for a proof.
    Second, the background task... if I get it going on making that 8-minute PDF and then work some more on the document, what exactly is in the PDF? Usually I save before making a PDF or printing. So, is the last version saved what will be in the PDF?
    (As an aside, this ability to work on the doc while generating a PDF seems kind of weird. Generally one makes a PDF for proofing, or even for printing, when all the changes have been made and everything is "final". So, I see no benefit to being able to work on my document while it's making a PDF, as I'm probably finished making revisions for the time being. I have to say that I kind of like the progress bar you get when you make an interactive PDF, as you know you can't work on the document when that's on the screen... )
    Thanks as always.

    First, I have noticed that it seems to take a lot longer to get to a PDF. Any suggestions for how to speed up the process? It took 8 minutes or so to generate a low-res PDF (for print) of a 24pp document with a few placed images and vector graphics. Wow, that's a long time to wait, especially for a proof.
    Yes, this is abnormally long (and too long), something is wrong. What's the full version of InDesign you are running, as reported by holding down Cmd or Control and selecting About InDesign?
    Second, the background task... if I get it going on making that 8-minute PDF and then work some more on the document, what exactly is in the PDF? Usually I save before making a PDF or printing. So, is the last version saved what will be in the PDF?
    Saving is not related. InDesign makes a database snapshot of your document the moment you begin the PDF export, and makes the export relative to that snapshot, regardless of edits you continue to make during the export process, and regardless of saving. Of course saving first is a good idea, for several reasons, not the least of which it sounds like something's fairly seriously wrong with your document or your InDesign installation.
    We recommend you trash your preferences and export your document to IDML and see if either of those things changes this 8-minute behavior...err, assuming you're running 7.5.2.318.
    (As an aside, this ability to work on the doc while generating a PDF seems kind of weird. Generally one makes a PDF for proofing, or even for printing, when all the changes have been made and everything is "final". So, I see no benefit to being able to work on my document while it's making a PDF, as I'm probably finished making revisions for the time being. I have to say that I kind of like the progress bar you get when you make an interactive PDF, as you know you can't work on the document when that's on the screen... )
    Yeah, I think the primary benefit is if you are likely to work on 2 or more files in parallel, so you can finish A and export A and then switch to B. If you'd like a dialog box to pop up when export is done, check out my exportPop script from this post: ANN: automatic dialog after background export (exportPop.jsx.

  • Questions about supporting TLF with Halo components in Flex 4.1

    We recently decided to upgrade to the Flex 4.1 SDK after a year or so at 3.2.  We have been asked to not use the new SPARK components yet because our products would then have a mistmatch of Halo and Spark components in the UI.  We have built support for our Halo components to display html through the ".htmlText" property for the Text components.  For example, we can display strings such as "<p>Choose <b>one</b> option:</p>".  With the upgrade to Flex 4.1 a couple of questions about supporting bi-directional text have come up.  My understanding is that in order to support bi-directional text we need to use the Text Layout Framework.  Does anyone have a suggestion on how we can utilize the TLF with the Halo components in Flex 4.1?    Can we still use the ".htmlText" property somehow or is there a new property that understands the TextFormat markup?  We would love to still be able to use the limited html tags that are supported for the "htmlText" property.  Is there an option where that syntax is still understood?
    Thanks in advance!
    David

    The halo components use TextField, and the spark components use TLF. Both sets have support for some html markup to import and export text. To use bidi text, you have to use TLF; TextField won't work properly.
    It is possible to use TLF to build your own components, and this can work well particularly for applications with specialized needs. But if you need bidi support for advanced components like DataGrid and List, then you should use the spark components.
    Thanks!
    - robin

  • A few questions about using PS3 with 27" iMac display...

    Hey people, I had a few questions about how I could possibly get my ps3 connected to the iMac's 27" screen. First of all, could you guys list some adapters that would be able to convert the HDMI to Mini displayport? That would be great. The only one I know of is that Dr. Bott Digital Video link.
    Okay secondly, I was wondering if I do get the the ps3 connected with the iMac's display with an adapter to convert HDMI to mini DisplayPort, would it be in HD? Would I be able to play ps3 games or watch blu-ray movies in 1080p HD format?
    Thanks!

    Welcome to the Apple Discussions!
    This has been asked a number of times here since the intro of the 27" iMac. The answer is very expensive US$149 or more converters and sometimes even more expensive to maintain the resolutions that you seek.
    http://lowendmac.com/ed/bashur/09db/dvi-to-mini-displayport.html
    Dah•veed

  • "not-so-secured" network with Airport.

    Hello everybody.
    (Sorry for my english, i am a belgian user)
    As i have no Wi-Fi modem, I recentltly created a secured wi-fi network with my Mac Mini to connect easily my ipod touch and family's computers. I used Airport and "create new network" tool. All works perfectly and i am very happy with this.
    The problem is when i reboot the Mac Mini. As soon as Leopard is started, it create a new UNSECURED wifi network, so all the people in my flat can connect my network, access the printers and shared docs ( i didn't protect them to let an acces to all my family and friends that come home)
    I have to stop Airport at the boot of MacOS to stop the unsecured network and then create a the usual secured network...
    This is a big problem for me and i really would like leopard to remember my network and parameters (password) to have the same wifi network each time i boot up my Mac.
    I think that a Mac that create an unsecured network at the startup is a big lack of securit ( or i din't find the correct option???)
    Thank a lot for all your help
    C.V.

    You mean, you enabled Internet sharing in System preferences, Sharing.
    Well, I would not be so sure that such a connection is secure, mainly because WEP is the only algorithm available with that kind of network.
    That said, I tried it a couple of times and it works very well, but I never used it as a long stand solution. So I cannot say if the behaviour you described it's normal.

  • Question about 360 movieclip with cursor action

    Hello Flash Forum
    We have a question about a 360 flash / movieclip which comes
    to a halt or jumps to whereever the cursor is moved horizontally
    while any vertical movements is ignored. We are having difficulties
    to implement this and would like to ask whether someone can point
    us into the right direction in Flash 8 - read somewhere that this
    is extremely easy in Flash 8 but we cannot find out how!?
    An example would be:
    http://www.kswiss.com/cgi-bin/kswiss/store/product_detail.html?mv_arg=x&pid=01190:177
    and then chosing 'Go 360'
    Thank you for any assistance and/or direction.
    Alex

    Alex, took a look at your sample - looks to me like
    start_drag and stop_drag on mouse_over. Hope this helps. ash

  • Questions about securing a file to prevent printing

    I need to prevent users from printing a file, and I tried to set up a password under Windows and got a message "Use of non-FIPS cryptology is not permitted while in FIPS mode." I was able to add the password on a Mac and it did the job (prevented printing on Mac and Windows), but I remember coming across a problem a few years ago with a password-protected file for a client (I may have enabled the FIPS mode on this computer at that time to check that file). I don't remember exactly what the problem was at that time; it was an editable form and I'm assuming that the problem was that the file could not be saved once the data was entered into the file.
    My current document will not have any editable fields, and I just wanted to check to see if there could be any potential problems with using password security in case this client has FIPS mode enabled.

    In Acrobat Pro 9, select Advanced > Security > Encrypt With Password.  At the bottom of that screen you can restrict printing.

  • Question about using RE1000 with EA6500

    I have an EA6500 route but having problem getting wireless signal to one room in my house.  As a result, I am thinking about buying RE1000.
    If I buy this unit, will I need to connect to a different network when using wireless devices in the room near the extender.
    Or will both the extender and router operate as a single wireless network name?  If they both operate under a single wireless name, how will I know the extender is connecting and working.
    Please let me know.  Thanks.

    atomarchio wrote:
    I have an EA6500 route but having problem getting wireless signal to one room in my house.  As a result, I am thinking about buying RE1000.
    If I buy this unit, will I need to connect to a different network when using wireless devices in the room near the extender.
    Or will both the extender and router operate as a single wireless network name?  If they both operate under a single wireless name, how will I know the extender is connecting and working.
    Please let me know.  Thanks.
    Just to answer your question, RE1000 will extend your router's main wireless network - so they will operate with single / same wireless network name. You'll know that the extender is connected and working if you'll be able to see the RE1000 listed on your router's DHCP client's table.
    If everyone needs to believe in something, I believe I'll have another beer..

  • Question about same emails with others

    Good afternoon, the other day I walked into
    yahoo.com, because I wondered if
    I had done earlier account there.
    So, when I tried to log in, I chose
    that I can not remember my identity
    and asked me to write the security email
    I would have put in during my
    recording time. Me, I put
    my mainly EMAIL, which is: [email protected]
    After some time I realized that
    some unknown had used my email
    as security email to his account
    on yahoo. Later I checked the
    recent activity in my email in hotmail
    and indicate places where I have not been
    in any of the times I entered my
    account. Finally, there are some messages
    about verifying my identity to an account
    of Apple, which does not come from
    me. My question is whether it is possible
    to have the same email with
    these girls, who have the same name and
    the same first letter on their surname
    as me?? Thank you in advance!

    WLS loads classes from weblogic.class.path property
    Refer this document
    http://www.weblogic.com/docs51/admindocs/classpath.html
    Kumar
    Paul Shen wrote:
    At first, thanks Jesse for the help. Sorry for my mistake that making
    question 3 out of context.
    WinNT 4.0 SP6, Weblogic 5.10, SQLServer 7.0
    I wanna create a connection pool for SQLServer. At beginning, I
    mis-add the JDBC Driver class path to weblogic.class.path. As a result
    the pool creating failed. After I add the JDBC Driver class path to
    weblogic.class.path and CLASSPATH (by wlconfig), the pool created
    succefully.
    For testing purpose, I changed weblogic.class.path back, then
    restarted NT, started Weblogic Server, to my surprise, the pool was
    created as well! How do you think about this?
    Paul
    On 22 Aug 2000 12:27:28 -0800, [email protected] (Jesse E Tilly)
    wrote:
    Comments inline...
    [email protected] (Paul Shen) wrote in <wS2iOZDX8dSgABq4nblptb+wg7Uz@
    4ax.com>:
    3. For testing purpose, I changed weblogic.class.path back, then
    restarted NT, started Weblogic Server, to my surprise, the pool was
    created as well! How do you think about this?This question seems out of context. I do not know what pool you are
    referring to, nor the actions prior to changing the classpath.
    Jesse

  • Somewhat confused about extending network with express

    I have a Belkin N+ wireless router running between my imac and cable modem. They are both in my office next to my computer.
    My wife's macbook is at the other end of our house. The signal she gets is ok. When I turn on my ipod touch in our bedroom, the signal it receives is barely adequate.
    I have a "N" express. I thought if I plugged it into the wall midway between my office and my wife's that would act as kind of a repeater to give the signal a boost in that part of the house.
    Is that wrong?
    If so, is there anything I can do with the express to boost the signal for her office and the ipod at that end.
    Maybe plug it into the wall by her macbook and run and Ethernet cable into her macbook? Would doing that also boost the wireless signal in that part of the house?
    I've read a bit on this forum about connected the express to the wireless modem and then adding another express. Would that do it?
    Sorry for so many questions, but I would be grateful for any advice.
    jeff

    Just one more quick question: if I pick up an extra express to go with the one I already have, plus the extreme, will three as opposed to to the extreme and one express make the network that much stronger?
    Adding base stations won't make it "stronger". With additional base stations you can increase the coverage of the wireless network.
    Ok, two questions, is there a special setup with the routers plus the cable modem that would be most efficient for broadcasting the signal through my home?
    No

Maybe you are looking for

  • Edit file size disagreement

    Editing the library of Aperture is covered by using Textwrangler, but I post this in hopes someone else had the exact same issue and that they can share their info on how they resolved it. I have a file library that contains referenced files. Looks l

  • Nokia N8 - Circles in camera pictures

    Hi Guys I was wondering if someone could help me as I have a issue with my n8 camera. I was playing around indoors and taking pictures and I noticed some circles in one of the photos but this only happens when im taking a pictures at a certain angle.

  • How to ignore a particular Aborted Job from CCMS Alerts

    Hello All, I am trying to ignore a  particular Aborted job from reporting in CCMS alerts. Any one can suggest how can I achieve this ? Regards Amit

  • How can I get the File Creation Date OR Last modification date of the incoming file in my message?

    I need the Last Modification Date and the File creation date of the consumed file in my message, is it possible to do that using a custom pipeline component in decode stage or any other way? The FILE namespace have File creation time that actually gi

  • IOS 5 & Lost iPhoto library

    When I updated to IOS 5, somehow I lost my entire iPhoto library, i.e. I can find none of the actual images and none of them were reloaded into the app.  Is there a metadata or backup database somewhere, hopefully, that is cradling my images?  Any he