[TABS_R id=8782]
You are using ASDM to verify a VPN configuration made by another administrator on an ASA. Please click exhibit to examine the network configuration.
A user accesses the VPN by typing https://203.0.113.1/default in a browser’s location bar.
Which of the following is true? (Select the best answer.)
Exhibit:

- The local database will be used to authenticate only if RADIUS fails.
- The group policy named DfltGrpPolicy will be applied.
- The user’s DNS server will be boson.com.
- The session will fail because Clientless SSL VPN is not enabled.
Explanation:
The group policy named DfltGrpPolicy will be applied if the user accesses the virtual private network (VPN) by typing https://203.0.113.1/default in a browser’s location bar. In this scenario, the default alias is associated with the Cisco Adaptive Security Appliance (ASA) connection profile named DefaultWEBVPNGroup. You can determine which aliases are associated with which connection profiles by navigating to Configuration > Remote Access VPN > Clientless SSL VPN Access > Connection Profiles in Cisco Adaptive Security Device Manager (ASDM), as shown in the following exhibit:

You can determine which group policy will be applied by examining the value in the Group Policy column of the connection profile’s entry in the Connection Profiles area of the Connection Profiles screen. If you wanted to modify the group policy value in ASDM, you would select the appropriate connection profile. The Group Policy dropdown menu will then enable you to select the group policy that should be applied to the connection profile, as shown in the following exhibit:

[TABS_R id=8782]