Cisco 300-209
Cisco 300-209
Answer: A,D
Explanation:
QUESTION NO: 2
A company has decided to migrate an existing IKEv1 VPN tunnel to IKEv2. Which two are valid
configuration constructs on a Cisco IOS router? (Choose two.)
Answer: A,E
Explanation:
QUESTION NO: 3
Answer: A,B,C,D
Explanation:
QUESTION NO: 4
A. Group-policy
B. Tunnel-group
C. Crypto-map
D. Web-VPN Portal
E. ISAKMP client
Answer: A
Explanation:
QUESTION NO: 5
Which of the following could be used to configure remote access VPN Host-scan and pre-login
policies?
A. ASDM
B. Connection-profile CLI command
C. Host-scan CLI command under the VPN group policy
D. Pre-login-check CLI command
Answer: A
Explanation:
In FlexVPN, what command can an administrator use to create a virtual template interface that
can be configured and applied dynamically to create virtual access interfaces?
Answer: B
Explanation: Hello - here is a reference an explanation that can be included with this test.
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/15-2mt/sec-flex-
spoke.html#GUID-4A10927D-4C6A-4202-B01C-DA7E462F5D8A
SUMMARY STEPS
1. enable
2. configure terminal
3. interface virtual-template number type tunnel
4. ip unnumbered tunnel number
5. ip nhrp network-id number
6. ip nhrp shortcut virtual-template-number
7. ip nhrp redirect [timeout seconds]
8. exit
QUESTION NO: 7
A. It allows these entities to directly communicate without requiring traffic to use an intermediate
hop
B. It dynamically assigns VPN users to a group
C. It blocks these entities from to directly communicating with each other
D. It makes sure that each VPN spoke directly communicates with the hub
Answer: A
Explanation:
QUESTION NO: 8
Answer: B,D,E
Explanation:
QUESTION NO: 9
A. point-to-point
B. hub-and-spoke
C. full mesh
D. on-demand spoke-to-spoke
Answer: C
Explanation:
QUESTION NO: 10
Which two GDOI encryption keys are used within a GET VPN network? (Choose two.)
Answer: A,D
Explanation:
QUESTION NO: 11
What are the three primary components of a GET VPN network? (Choose three.)
Answer: A,E,F
Explanation:
QUESTION NO: 12
Which two IKEv1 policy options must match on each peer when you configure an IPsec site-to-site
VPN? (Choose two.)
A. priority number
B. hash algorithm
C. encryption algorithm
D. session lifetime
E. PRF algorithm
Answer: B,C
Explanation:
QUESTION NO: 13
Which two parameters are configured within an IKEv2 proposal on an IOS router? (Choose two.)
A. authentication
B. encryption
C. integrity
D. lifetime
Answer: B,C
QUESTION NO: 14
In a spoke-to-spoke DMVPN topology, which type of interface does a branch router require?
Answer: B
Explanation:
QUESTION NO: 15
QUESTION NO: 16
Which three settings are required for crypto map configuration? (Choose three.)
A. match address
B. set peer
C. set transform-set
D. set security-association lifetime
E. set security-association level per-host
F. set pfs
Answer: A,B,C
Explanation:
QUESTION NO: 17
A network is configured to allow clientless access to resources inside the network. Which feature
must be enabled and configured to allow SSH applications to respond on the specified port 8889?
Answer: B
Explanation:
QUESTION NO: 18
Consider this scenario. When users attempt to connect via a Cisco AnyConnect VPN session, the
certificate has changed and the connection fails.
Answer: C
Explanation:
QUESTION NO: 19
In the Cisco ASDM interface, where do you enable the DTLS protocol setting?
A. Configuration > Remote Access VPN > Network (Client) Access > Group Policies > Add or Edit
> Add or Edit Internal Group Policy
B. Configuration > Remote Access VPN > Network (Client) Access > AAA Setup > Local Users >
Add or Edit
C. Device Management > Users/AAA > User Accounts > Add or Edit > Add or Edit User Account >
VPN Policy > SSL VPN Client
D. Configuration > Remote Access VPN > Network (Client) Access > Group Policies > Add or Edit
Answer: C
Explanation: The reference:
http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect20/administrative/
guide/admin/admin5.html
• Configuration > Remote Access VPN > Network (Client) Access > AAA Setup > Local Users >
Add or Edit > Add or Edit User Account > VPN Policy > SSL VPN Client
•Device Management > Users/AAA > User Accounts > Add or Edit > Add or Edit User Account >
VPN Policy > SSL VPN Client
QUESTION NO: 20
Answer: A,B
Explanation:
QUESTION NO: 21
When Cisco ASA applies VPN permissions, what is the first set of attributes that it applies?
Answer: A
Explanation:
QUESTION NO: 22
What are two variables for configuring clientless SSL VPN single sign-on? (Choose two.)
A. CSCO_WEBVPN_OTP_PASSWORD
B. CSCO_WEBVPN_INTERNAL_PASSWORD
C. CSCO_WEBVPN_USERNAME
D. CSCO_WEBVPN_RADIUS_USER
Answer: B,C
Explanation:
QUESTION NO: 23
To change the title panel on the logon page of the Cisco IOS WebVPN portal, which file must you
configure?
Answer: A
Explanation:
QUESTION NO: 24
Which three plugins are available for clientless SSL VPN? (Choose three.)
A. CIFS
B. RDP2
C. SSH
D. VNC
E. SQLNET
F. ICMP
Answer: B,C,D
Explanation:
QUESTION NO: 25
Which command simplifies the task of converting an SSL VPN to an IKEv2 VPN on a Cisco ASA
appliance that has an invalid IKEv2 configuration?
Answer: A
Explanation: Below is a reference for this question:
http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-
firewalls/113597-ptn-113597.html
If your IKEv1, or even SSL, configuration already exists, the ASA makes the migration process
simple. On the command line, enter the migrate command:
Keyword definitions:
remote access - This converts the remote access configuration. You can convert either the IKEv1
or the SSL tunnel groups to IKEv2.
overwrite - If you have a IKEv2 configuration that you wish to overwrite, then this keyword converts
the current IKEv1 configuration and removes the superfluous IKEv2 configuration.
QUESTION NO: 26
Which statement describes a prerequisite for single-sign-on Netegrity Cookie Support in an IOC
SSL VPN?
Answer: C
Explanation:
QUESTION NO: 27
Which two statements describe effects of the DoNothing option within the untrusted network policy
on a Cisco AnyConnect profile? (Choose two.)
Answer: A,D
Explanation:
QUESTION NO: 28
Which command enables IOS SSL VPN Smart Tunnel support for PuTTY?
Answer: B
Explanation:
QUESTION NO: 29
Which three remote access VPN methods in an ASA appliance provide support for Cisco Secure
Desktop? (Choose three.)
A. IKEv1
B. IKEv2
C. SSL client
D. SSL clientless
E. ESP
F. L2TP
Answer: B,C,D
Explanation:
QUESTION NO: 30
A user is unable to establish an AnyConnect VPN connection to an ASA. When using the Real-
Time Log viewer within ASDM to troubleshoot the issue, which two filter options would the
administrator choose to show only syslog messages relevant to the VPN connection? (Choose
two.)
Answer: A,D
Explanation:
QUESTION NO: 31
Answer: A
Explanation:
QUESTION NO: 32
Answer: B
Explanation:
QUESTION NO: 33
A. Capture user traffic using command capture capin interface inside match ip host 10.10.10.10
any
B. After verifying that user traffic reaches the firewall using syslogs or captures, use packet tracer
Answer: A,B
Explanation:
QUESTION NO: 34
A Cisco router may have a fan issue that could increase its temperature and trigger a failure. What
troubleshooting steps would verify the issue without causing additional risks?
A. Configure logging using commands "logging on", "logging buffered 4", and check for fan failure
logs using "show logging"
B. Configure logging using commands "logging on", "logging buffered 6", and check for fan failure
logs using "show logging"
C. Configure logging using commands "logging on", "logging discriminator msglog1 console 7",
and check for fan failure logs using "show logging"
D. Configure logging using commands "logging host 10.11.10.11", "logging trap 2", and check for
fan failure logs at the syslog server 10.11.10.11
Answer: A
Explanation:
QUESTION NO: 35
An internet-based VPN solution is being considered to replace an existing private WAN connecting
remote offices. A multimedia application is used that relies on multicast for communication.
Which two VPN solutions meet the application's network requirement? (Choose two.)
A. FlexVPN
B. DMVPN
C. Group Encrypted Transport VPN
D. Crypto-map based Site-to-Site IPsec VPNs
E. AnyConnect VPN
Answer: A,B
QUESTION NO: 36
A private wan connection is suspected of intermittently corrupting data. Which technology can a
network administrator use to detect and drop the altered data traffic?
A. AES-128
B. RSA Certificates
C. SHA2-HMAC
D. 3DES
E. Diffie-Helman Key Generation
Answer: C
Explanation:
QUESTION NO: 37
A company needs to provide secure access to its remote workforce. The end users use public
kiosk computers and a wide range of devices. They will be accessing only an internal web
application. Which VPN solution satisfies these requirements?
A. Clientless SSLVPN
B. AnyConnect Client using SSLVPN
C. AnyConnect Client using IKEv2
D. FlexVPN Client
E. Windows built-in PPTP client
Answer: A
Explanation:
QUESTION NO: 38
A network administrator is configuring AES encryption for the ISAKMP policy on an IOS router.
Which two configurations are valid? (Choose two.)
Answer: B,C
Explanation:
QUESTION NO: 39
Which two qualify as Next Generation Encryption integrity algorithms? (Choose two.)
A. SHA-512
B. SHA-256
C. SHA-192
D. SHA-380
E. SHA-192
F. SHA-196
Answer: A,B
Explanation:
QUESTION NO: 40
Which statement is true when implementing a router with a dynamic public IP address in a crypto
map based site-to-site VPN?
Answer: C
Explanation:
QUESTION NO: 41
Which two statements are true when designing a SSL VPN solution using Cisco AnyConnect?
(Choose two.)
Answer: D,E
Explanation:
QUESTION NO: 42
Which two features are required when configuring a DMVPN network? (Choose two.)
Answer: B,C
Explanation:
QUESTION NO: 43
A. Administrators can use summarization of routing protocol updates from hub to spokes.
B. It introduces hierarchical DMVPN deployments.
C. It introduces non-hierarchical DMVPN deployments.
D. It supports L2TP over IPSec as one of the VPN protocols.
Answer: A,B
Explanation:
QUESTION NO: 44
Which are two main use cases for Clientless SSL VPN? (Choose two.)
Answer: A,B
Explanation:
QUESTION NO: 45
Which technology can rate-limit the number of tunnels on a DMVPN hub when system utilization is
above a specified percentage?
Answer: C
Explanation:
QUESTION NO: 46
Which technology supports tunnel interfaces while remaining compatible with legacy VPN
implementations?
A. FlexVPN
B. DMVPN
C. GET VPN
D. SSL VPN
Answer: A
QUESTION NO: 47
Which IKEv2 feature minimizes the configuration of a FlexVPN on Cisco IOS devices?
A. IKEv2 Suite-B
B. IKEv2 proposals
C. IKEv2 profiles
D. IKEv2 Smart Defaults
Answer: D
Explanation:
QUESTION NO: 48
When an IPsec SVTI is configured, which technology processes traffic forwarding for encryption?
A. ACL
B. IP routing
C. RRI
D. front door VPN routing and forwarding
Answer: B
Explanation:
QUESTION NO: 49
An IOS SSL VPN is configured to forward TCP ports. A remote user cannot access the corporate
FTP site with a Web browser. What is a possible reason for the failure?
Answer: B
Explanation: http://www.cisco.com/c/en/us/support/docs/security/ssl-vpn-client/70664-
A remote client must download a small, Java-based applet for secure access of TCP applications
that use static port numbers. UDP is not supported. Examples include access to POP3, SMTP,
IMAP, SSH, and Telnet. The user needs local administrative privileges because changes are
made to files on the local machine. This method of SSL VPN does not work with applications that
use dynamic port assignments, for example, several FTP applications.
QUESTION NO: 50
A Cisco IOS SSL VPN gateway is configured to operate in clientless mode so that users can
access file shares on a Microsoft Windows 2003 server. Which protocol is used between the Cisco
IOS router and the Windows server?
A. HTTPS
B. NetBIOS
C. CIFS
D. HTTP
Answer: C
Explanation:
QUESTION NO: 51
You are configuring a Cisco IOS SSL VPN gateway to operate with DVTI support. Which
command must you configure on the virtual template?
Answer: D
Explanation:
Which protocol supports high availability in a Cisco IOS SSL VPN environment?
A. HSRP
B. VRRP
C. GLBP
D. IRDP
Answer: A
Explanation:
QUESTION NO: 53
When you configure IPsec VPN High Availability Enhancements, which technology does Cisco
recommend that you enable to make reconvergence faster?
A. EOT
B. IP SLAs
C. periodic IKE keepalives
D. VPN fast detection
Answer: C
Explanation:
QUESTION NO: 54
A. MD5
B. SHA-1
C. SHA-256
D. SHA-384
Answer: D
Explanation:
QUESTION NO: 55
A. HIPPA DES
B. AES-128
C. RC4-128
D. AES-256
Answer: D
Explanation:
QUESTION NO: 56
A. FWSM
B. Cisco ASA 5505
C. Cisco ASA 5580
D. Cisco ASA 5525-X
Answer: D
Explanation:
QUESTION NO: 57
A. 3DES
B. AES
C. DES
D. RSA
Answer: D
Explanation:
QUESTION NO: 58
Which encryption and authentication algorithms does Cisco recommend when deploying a Cisco
NGE supported VPN solution?
Answer: A
Explanation:
QUESTION NO: 59
An administrator wishes to limit the networks reachable over the Anyconnect VPN tunnels. Which
configuration on the ASA will correctly limit the networks reachable to 209.165.201.0/27 and
209.165.202.128/27?
Answer: A
Explanation:
QUESTION NO: 60
Which NGE IKE Diffie-Hellman group identifier has the strongest cryptographic properties?
A. group 10
B. group 24
C. group 5
D. group 20
Answer: D
Explanation:
QUESTION NO: 61
What is the Cisco recommended TCP maximum segment on a DMVPN tunnel interface when the
MTU is set to 1400 bytes?
A. 1160 bytes
B. 1260 bytes
C. 1360 bytes
D. 1240 bytes
Answer: C
Explanation:
QUESTION NO: 62
A. ESP
B. dynamic routing
C. NHRP
D. CEF
E. IPSec
Answer: C
Explanation:
QUESTION NO: 63
Which two cryptographic technologies are recommended for use with FlexVPN? (Choose two.)
Answer: A,B
Explanation:
QUESTION NO: 64
Answer: D
Explanation:
QUESTION NO: 65
Which two examples of transform sets are contained in the IKEv2 default proposal? (Choose two.)
A. aes-cbc-192, sha256, 14
B. 3des, md5, 5
C. 3des, sha1, 1
D. aes-cbc-128, sha, 5
Answer: B,D
Explanation:
What is the default storage location of user-level bookmarks in an IOS clientless SSL VPN?
A. disk0:/webvpn/{context name}/
B. disk1:/webvpn/{context name}/
C. flash:/webvpn/{context name}/
D. nvram:/webvpn/{context name}/
Answer: C
Explanation:
QUESTION NO: 67
Which command will prevent a group policy from inheriting a filter ACL in a clientless SSL VPN?
A. vpn-filter none
B. no vpn-filter
C. filter value none
D. filter value ACLname
Answer: C
Explanation:
QUESTION NO: 68
Which command specifies the path to the Host Scan package in an ASA AnyConnect VPN?
Answer: B
Explanation:
QUESTION NO: 69
When a tunnel is initiated by the headquarter ASA, which one of the following Diffie-Hellman
A. 1
B. 2
C. 5
D. 14
E. 19
Answer: C
Explanation:
Traffic initiated by the HQ ASA is assigned to the static outside crypto map, which shown below to
use DH group 5.
QUESTION NO: 70
Based on the provided ASDM configuration for the remote ASA, which one of the following is
correct?
A. An access-list must be configured on the outside interface to permit inbound VPN traffic
B. A route to 192.168.22.0/24 will not be automatically installed in the routing table
C. The ASA will use a window of 128 packets (64x2) to perform the anti-replay check _
D. The tunnel can also be established on TCP port 10000
Answer: C
Explanation:
Cisco IP security (IPsec) authentication provides anti-replay protection against an attacker
duplicating encrypted packets by assigning a unique sequence number to each encrypted packet.
The decryptor keeps track of which packets it has seen on the basis of these numbers. Currently,
QUESTION NO: 71
If the IKEv2 tunnel were to establish successfully, which encryption algorithm would be used to
encrypt traffic?
A. DES
B. 3DES
C. AES
D. AES192
E. AES256
Answer: E
Explanation:
Both ASA’s are configured to support AES 256, so during the IPSec negotiation they will use the
strongest algorithm that is supported by each peer.
QUESTION NO: 72
After implementing the IKEv2 tunnel, it was observed that remote users on the 192.168.33.0/24
network are unable to access the internet. Which of the following can be done to resolve this
problem?
A. Change the Diffie-Hellman group on the headquarter ASA to group5forthe dynamic crypto map
B. Change the remote traffic selector on the remote ASA to 192.168.22.0/24
C. Change to an IKEvI configuration since IKEv2 does not support a full tunnel with static peers
D. Change the local traffic selector on the headquarter ASA to 0.0.0.0/0
E. Change the remote traffic selector on the headquarter ASA to 0.0.0.0/0
Answer: B
Explanation:
The traffic selector is used to determine which traffic should be protected (encrypted over the
IPSec tunnel). We want this to be specific, otherwise Internet traffic will also be sent over the
QUESTION NO: 73
Which option shows the correct traffic selectors for the child SA on the remote ASA, when the
headquarter ASA initiates the tunnel?
Answer: B
Explanation: The traffic selector is used to determine which traffic should be protected (encrypted
over the IPSec tunnel). We want this to be specific, otherwise Internet traffic will also be sent over
the tunnel and most likely dropped on the remote side. Here, we just want to protect traffic from
192.168.33.0/24 (THE LOCAL SIDE) to 192.168.22.0/24 (THE REMOTE SIDE).
QUESTION NO: 75
A custom desktop application needs to access an internal server. An administrator is tasked with
configuring the company's SSL VPN gateway to allow remote users to work. Which two
technologies would accommodate the company's requirement? (Choose two).
A. AnyConnect client
B. Smart Tunnels
C. Email Proxy
D. Content Rewriter
E. Portal Customizations
Answer: A,B
Explanation:
A rogue static route is installed in the routing table of a Cisco FlexVPN and is causing traffic to be
blackholed. Which command should be used to identify the peer from which that route originated?
Answer: A
Explanation:
QUESTION NO: 77
Which authentication method was used by the remote peer to prove its identity?
Answer: C
Explanation:
QUESTION NO: 78
An IPsec peer is exchanging routes using IKEv2, but the routes are not installed in the RIB. Which
configuration error is causing the failure?
Answer: B
Explanation:
QUESTION NO: 79
Answer: D
Explanation:
QUESTION NO: 80
The IKEv2 tunnel between Router1 and Router2 is failing during session establishment. Which
action will allow the session to establish correctly?
Answer: B
Explanation:
QUESTION NO: 81
You are troubleshooting a site-to-site VPN issue where the tunnel is not establishing. After issuing
the debug crypto isakmp command on the headend router, you see the following output. What
does this output suggest?
Answer: A
Explanation:
QUESTION NO: 82
You are troubleshooting a site-to-site VPN issue where the tunnel is not establishing. After issuing
the debug crypto ipsec command on the headend router, you see the following output. What does
this output suggest?
Answer: B
Explanation:
QUESTION NO: 83
Which adaptive security appliance command can be used to see a generic framework of the
Answer: A
Explanation:
QUESTION NO: 84
After completing a site-to-site VPN setup between two routers, application performance over the
tunnel is slow. You issue the show crypto ipsec sa command and see the following output. What
does this output suggest?
interfacE. Tunnel100
PERMIT, flags={origin_is_acl,}
Answer: E
Explanation:
QUESTION NO: 85
Which Cisco adaptive security appliance command can be used to view the count of all active
VPN sessions?
Answer: A
Explanation:
QUESTION NO: 86
An administrator had the above configuration working with SSL protocol, but as soon as the
administrator specified IPsec as the primary protocol, the Cisco AnyConnect client was not able to
connect. What is the problem?
Answer: C
Explanation:
QUESTION NO: 87
The Cisco AnyConnect client fails to connect via IKEv2 but works with SSL. The following error
message is displayed:
A. DAP is terminating the connection because IKEv2 is the protocol that is being used.
B. The client endpoint does not have the correct user profile to initiate an IKEv2 connection.
C. The AAA server that is being used does not authorize IKEv2 as the connection mechanism.
D. The administrator is restricting access to this specific user.
E. The IKEv2 protocol is not enabled in the group policy of the VPN headend.
Answer: E
Explanation:
QUESTION NO: 88
The Cisco AnyConnect client is unable to download an updated user profile from the ASA
headend using IKEv2. What is the most likely cause of this problem?
Answer: D
Explanation:
QUESTION NO: 89
Which two troubleshooting steps should be taken when Cisco AnyConnect cannot establish an
IKEv2 connection, while SSL works fine? (Choose two.)
A. Verify that the primary protocol on the client machine is set to IPsec.
B. Verify that AnyConnect is enabled on the correct interface.
C. Verify that the IKEv2 protocol is enabled on the group policy.
D. Verify that ASDM and AnyConnect are not using the same port.
E. Verify that SSL and IKEv2 certificates are not referencing the same trustpoint.
Answer: A,C
Explanation:
Regarding licensing, which option will allow IKEv2 connections on the adaptive security
appliance?
Answer: A
Explanation:
QUESTION NO: 91
Answer: C
Explanation:
QUESTION NO: 92
What action does the hub take when it receives a NHRP resolution request from a spoke for a
network that exists behind another spoke?
Answer: C
Explanation:
QUESTION NO: 93
A spoke has two Internet connections for failover. How can you achieve optimum failover without
affecting any other router in the DMVPN cloud?
A. Create another DMVPN cloud by configuring another tunnel interface that is sourced from the
second ISP link.
B. Use another router at the spoke site, because two ISP connections on the same router for the
same hub is not allowed.
C. Configure SLA tracking, and when the primary interface goes down, manually change the
tunnel source of the tunnel interface.
D. Create another tunnel interface with same configuration except the tunnel source, and
configure the if-state nhrp and backup interface commands on the primary tunnel interface.
Answer: D
QUESTION NO: 94
In DMVPN phase 2, which two EIGRP features need to be disabled on the hub to allow spoke-to-
spoke communication? (Choose two.)
A. autosummary
B. split horizon
C. metric calculation using bandwidth
D. EIGRP address family
E. next-hop-self
F. default administrative distance
Answer: B,E
Explanation:
QUESTION NO: 95
Answer: A
Explanation:
QUESTION NO: 96
When troubleshooting established clientless SSL VPN issues, which three steps should be taken?
(Choose three.)
Answer: B,D,F
Explanation:
QUESTION NO: 97
A user is trying to connect to a Cisco IOS device using clientless SSL VPN and cannot establish
the connection. Which three commands can be used for troubleshooting of the AAA subsystem?
(Choose three.)
Answer: A,B,E
Explanation:
QUESTION NO: 98
Which option is a possible solution if you cannot access a URL through clientless SSL VPN with
Internet Explorer, while other browsers work fine?
Answer: A
Explanation:
QUESTION NO: 99
Answer: D
Explanation:
Answer: D
Explanation:
Which command clears all crypto configuration from a Cisco Adaptive Security Appliance?
Answer: A
Explanation:
Which Cisco adaptive security appliance command can be used to view the IPsec PSK of a tunnel
group in cleartext?
A. more system:running-config
Answer: A
Explanation:
An administrator desires that when work laptops are not connected to the corporate network, they
should automatically initiate an AnyConnect VPN tunnel back to headquarters. Where does the
administrator configure this?
A. Via the svc trusted-network command under the group-policy sub-configuration mode on the
ASA
B. Under the "Automatic VPN Policy" section inside the Anyconnect Profile Editor within ASDM
C. Under the TNDPolicy XML section within the Local Preferences file on the client computer
D. Via the svc trusted-network command under the global webvpn sub-configuration mode on the
ASA
Answer: B
Explanation:
What additional step is required if the client software fails to load when connecting to the ASA SSL
page?
Answer: A
Explanation:
Remote users want to access internal servers behind an ASA using Microsoft terminal services.
Which option outlines the steps required to allow users access via the ASA clientless VPN portal?
Answer: D
Explanation:
Which command is used to determine how many GMs have registered in a GETVPN
environment?
Answer: B
Explanation:
Answer: C
Explanation:
Answer: B
Explanation:
Which two statements about the given configuration are true? (Choose two.)
Answer: A,C
Explanation:
Answer: B
Explanation:
Which command enables the router to form EIGRP neighbor adjacencies with peers using a
different subnet than the ingress interface?
A. ip unnumbered interface
B. eigrp router-id
C. passive-interface interface name
D. ip split-horizon eigrp as number
Answer: A
Explanation:
Which feature enforces the corporate policy for Internet access to Cisco AnyConnect VPN users?
Answer: A
Explanation:
In which situation would you enable the Smart Tunnel option with clientless SSL VPN?
Answer: B
Explanation:
You executed the show crypto ipsec sa command to troubleshoot an IPSec issue. What problem
does the given output indicate?
Answer: B
Explanation:
Which two types of authentication are supported when you use Cisco ASDM to configure site-to-
site IKEv2 with IPv6? (Choose two.)
A. preshared key
B. webAuth
Answer: A,C
Explanation:
Which option describes the purpose of the shared argument in the DMVPN interface command
tunnel protection IPsec profile ProfileName shared?
Answer: A
Explanation:
A. spoke to hub
B. spoke to spoke
C. hub to spoke
D. hub to hub
Answer: B
Explanation:
A. OER
B. VRF
Answer: C
Explanation:
Which application does the Application Access feature of Clientless VPN support?
A. TFTP
B. VoIP
C. Telnet
D. active FTP
Answer: C
Explanation:
A. group policies
B. AnyConnect Connection Profile
C. AnyConnect Client Profile
D. Advanced Network (Client) Access
Answer: B
Explanation:
Which protocols does the Cisco AnyConnect client use to build multiple connections to the security
appliance?
Answer: A
Explanation:
A. NHRP
B. MPLS
C. GRE
D. ESP
Answer: D
Explanation:
Which VPN solution is best for a collection of branch offices connected by MPLS that frequenty
make VoIP calls between branches?
A. GETVPN
B. Cisco AnyConnect
C. site-to-site
D. DMVPN
Answer: A
Explanation:
A. DMVPN
B. GETVPN
C. FlexVPN
D. site-to-site
You have implemented an SSL VPN as shown. Which type of communication takes place
between the secure gateway R1 and the Cisco Secure ACS?
A. HTTP proxy
B. AAA
C. policy
D. port forwarding
Answer: B
Explanation:
A. DMVPN
B. a multiple-tunnel configuration
C. a Cisco ASA pair in active/passive failover configuration
D. certificate to tunnel group maps
A. Cisco AnyConnect
B. IPsec
C. L2TP
D. SSL VPN
Answer: B
Explanation:
Which technology must be installed on the client computer to enable users to launch applications
from a Clientless SSL VPN?
A. Java
B. QuickTime plug-in
C. Silverlight
D. Flash
A. a symmetric key
B. an asymmetric key
C. a decryption key
D. an encryption key
Answer: A
Explanation:
A. IKE Phase 1
B. IKE Phase 2
C. symmetric key exchange
D. certificate exchange
Answer: A
Explanation:
A. MD5
B. SHA2
C. Elliptical Curve Diffie-Hellman
D. 3DES
E. DES
Answer: B,C
Explanation:
A. TCP
B. UDP
C. IMAP
D. DDE
Answer: B
Explanation:
Scenario:
You are the network security manager for your organization. Your manager has received a request
to allow an external user to access to your HQ and DM2 servers. You are given the following
connection parameters for this task.
Using ASDM on the ASA, configure the parameters below and test your configuration by
accessing the Guest PC. Not all AS DM screens are active for this exercise. Also, for this exercise,
all changes are automatically applied to the ASA and you will not have to click APPLY to apply the
changes manually.
• Using the Guest PC, open an Internet Explorer window and test and verify the basic connection
to the SSL VPN portal using address: https://vpn-secure-x.public
• b. Username: vpnuser
• c. Password: cisco123
• i. http://10.10.3.20
• i. ftp://172.16.1.50
• i. DfltGrpPolicy
• ii. DfltAccessPolicy
You have completed this exercise when you have configured and successfully tested Clientless
SSL VPN connectivity.
Topology:
First, enable clientless VPN access on the outside interface by checking the box found below:
Logging in will take you to this page, which means you have now verified basic connectivity:
Make the name MY-BOOKMARKS and use the “Add” tab and add the bookmarks per the
instructions:
Ensure the “URL with GET of POST method” button is selected and hit OK:
Select the MY-BOOKMARKS Bookmarks and click on the “Assign” button. Then, click on the
appropriate check boxes as specified in the instructions and hit OK.
Then, go back to the Guest-PC, log back in and you should be able to test out the two new
bookmarks.
Scenario:
You are the senior network security administrator for your organization. Recently and junior
engineer configured a site-to-site IPsec VPN connection between your headquarters Cisco ASA
and a remote branch office.
You are now tasked with verifying the IKEvl IPsec installation to ensure it was properly configured
according to designated parameters. Using the CLI on both the Cisco ASA and branch ISR. verify
the IPsec configuration is properly configured between the two sites.
NOTE: the show running-config command cannot be used for the this exercise.
Topology:
A. Certifcates
B. Pre-shared keys
C. RSA public keys
D. Diffie-Hellman Group 2
Answer: B
Explanation: The show crypto isakmp key command shows the preshared key of “cisco”
Scenario:
You are the senior network security administrator for your organization. Recently and junior
engineer configured a site-to-site IPsec VPN connection between your headquarters Cisco ASA
and a remote branch office.
You are now tasked with verifying the IKEvl IPsec installation to ensure it was properly configured
NOTE: the show running-config command cannot be used for the this exercise.
Topology:
A. Default
B. ESP-3DES ESP-SHA-HMAC
C. ESP-AES-256-MD5-TRANS mode transport
D. TSET
Answer: B
Explanation: This can be seen from the “show crypto ipsec sa” command as shown below:
Scenario:
You are the senior network security administrator for your organization. Recently and junior
engineer configured a site-to-site IPsec VPN connection between your headquarters Cisco ASA
and a remote branch office.
You are now tasked with verifying the IKEvl IPsec installation to ensure it was properly configured
according to designated parameters. Using the CLI on both the Cisco ASA and branch ISR. verify
the IPsec configuration is properly configured between the two sites.
NOTE: the show running-config command cannot be used for the this exercise.
Topology:
Answer: B
Explanation: This can be seen from the “show crypto isa sa” command:
Scenario:
You are now tasked with verifying the IKEvl IPsec installation to ensure it was properly configured
according to designated parameters. Using the CLI on both the Cisco ASA and branch ISR. verify
the IPsec configuration is properly configured between the two sites.
NOTE: the show running-config command cannot be used for the this exercise.
Topology:
A. outside_cryptomap
B. VPN-to-ASA
C. L2L_Tunnel
D. outside_map1
Answer: D
Explanation:
This is seen from the “show crypto ipsec sa” command on the ASA.