A spoke has two Internet connections for failover. How can you achieve optimum failover without affecting any other router in the DMVPN cloud?
A spoke has two Internet connections for failover. How can you achieve optimum failover without affecting any other router in the DMVPN cloud?A . Create another DMVPN cloud by configuring another tunnel interface that is sourced from the second ISP link.B . Use another router at the spoke site, because...
Which of the following could be used to configure remote access VPN Host-scan and pre-login policies?
Which of the following could be used to configure remote access VPN Host-scan and pre-login policies?A . ASDMB . Connection-profile CLI commandC . Host-scan CLI command under the VPN group policyD . Pre-login-check CLI commandView AnswerAnswer: A
In FlexVPN, what command can an administrator use to create a virtual template interface that can be configured and applied dynamically to create virtual access interfaces?
In FlexVPN, what command can an administrator use to create a virtual template interface that can be configured and applied dynamically to create virtual access interfaces?A . interface virtual-template number type templateB . interface virtual-template number type tunnelC . interface template number type virtualD . interface tunnel-template numberView AnswerAnswer: B...
Which statement is true when implementing a router with a dynamic public IP address in a crypto map based site-to-site VPN?
Which statement is true when implementing a router with a dynamic public IP address in a crypto map based site-to-site VPN?A . The router must be configured with a dynamic crypto map.B . Certificates are always used for phase 1 authentication.C . The tunnel establishment will fail if the router...
Which command simplifies the task of converting an SSL VPN to an IKEv2 VPN on a Cisco ASA appliance that has an invalid IKEv2 configuration?
Which command simplifies the task of converting an SSL VPN to an IKEv2 VPN on a Cisco ASA appliance that has an invalid IKEv2 configuration?A . migrate remote-access ssl overwriteB . migrate remote-access ikev2C . migrate l2lD . migrate remote-access sslView AnswerAnswer: A Explanation: Below is a reference for this...
After implementing the IKEv2 tunnel, it was observed that remote users on the 192.168.33.0/24 network are unable to access the internet. Which of the following can be done to resolve this problem?
After implementing the IKEv2 tunnel, it was observed that remote users on the 192.168.33.0/24 network are unable to access the internet. Which of the following can be done to resolve this problem?A . Change the Diffie-Hellman group on the headquarter ASA to group5forthe dynamic crypto mapB . Change the remote...
What are three benefits of deploying a GET VPN? (Choose three.)
What are three benefits of deploying a GET VPN? (Choose three.)A . It provides highly scalable point-to-point topologies.B . It allows replication of packets after encryption.C . It is suited for enterprises running over a DMVPN network.D . It preserves original source and destination IP address information.E . It simplifies...
Which adaptive security appliance command can be used to see a generic framework of the requirements for configuring a VPN tunnel between an adaptive security appliance and a Cisco IOS router at a remote office?
Which adaptive security appliance command can be used to see a generic framework of the requirements for configuring a VPN tunnel between an adaptive security appliance and a Cisco IOS router at a remote office?A . vpnsetup site-to-site stepsB . show running-config cryptoC . show vpn-sessiondb l2lD . vpnsetup ssl-remote-access...
Which three remote access VPN methods in an ASA appliance provide support for Cisco Secure Desktop? (Choose three.)
Which three remote access VPN methods in an ASA appliance provide support for Cisco Secure Desktop? (Choose three.)A . IKEv1B . IKEv2C . SSL clientD . SSL clientlessE . ESPF . L2TPView AnswerAnswer: B, C, D
Which encryption and authentication algorithms does Cisco recommend when deploying a Cisco NGE supported VPN solution?
Which encryption and authentication algorithms does Cisco recommend when deploying a Cisco NGE supported VPN solution?A . AES-GCM and SHA-2B . 3DES and DHC . AES-CBC and SHA-1D . 3DES and SHA-1View AnswerAnswer: A