Which two qualify as Next Generation Encryption integrity algorithms? (Choose two.)
Which two qualify as Next Generation Encryption integrity algorithms? (Choose two.)A . SHA-512B . SHA-256C . SHA-192D . SHA-380E . SHA-192F . SHA-196View AnswerAnswer: A, B
The IKEv2 tunnel between Router1 and Router2 is failing during session establishment. Which action will allow the session to establish correctly?
Refer to the exhibit. The IKEv2 tunnel between Router1 and Router2 is failing during session establishment. Which action will allow the session to establish correctly?A . The address command on Router2 must be narrowed down to a /32 mask.B . The local and remote keys on Router2 must be switched.C...
Which protocol supports high availability in a Cisco IOS SSL VPN environment?
Which protocol supports high availability in a Cisco IOS SSL VPN environment?A . HSRPB . VRRPC . GLBPD . IRDPView AnswerAnswer: A
Which two cryptographic technologies are recommended for use with FlexVPN? (Choose two.)
Which two cryptographic technologies are recommended for use with FlexVPN? (Choose two.)A . SHA (HMAC variant)B . Diffie-HellmanC . DESD . MD5 (HMAC variant)View AnswerAnswer: A, B
Which Cisco ASDM option configures forwarding syslog messages to email?
Which Cisco ASDM option configures forwarding syslog messages to email?A . Configuration > Device Management > Logging > E-Mail SetupB . Configuration > Device Management > E-Mail Setup > Logging EnableC . Select the syslogs to email, click Edit, and select the Forward Messages option.D . Select the syslogs to...
Which NGE IKE Diffie-Hellman group identifier has the strongest cryptographic properties?
Which NGE IKE Diffie-Hellman group identifier has the strongest cryptographic properties?A . group 10B . group 24C . group 5D . group 20View AnswerAnswer: D
Which algorithm is replaced by elliptic curve cryptography in Cisco NGE?
Which algorithm is replaced by elliptic curve cryptography in Cisco NGE?A . 3DESB . AESC . DESD . RSAView AnswerAnswer: D
An administrator is adding IPv6 addressing to an already functioning tunnel. The administrator is unable to ping 2001:DB8:100::2 but can ping 209.165.200.226. Which configuration needs to be added or changed?
Refer to the exhibit. An administrator is adding IPv6 addressing to an already functioning tunnel. The administrator is unable to ping 2001:DB8:100::2 but can ping 209.165.200.226. Which configuration needs to be added or changed?A . No configuration change is necessary. Everything is working correctly.B . OSPFv3 needs to be configured...
After completing a site-to-site VPN setup between two routers, application performance over the tunnel is slow. You issue the show crypto ipsec sa command and see the following output. What does this output suggest?
After completing a site-to-site VPN setup between two routers, application performance over the tunnel is slow. You issue the show crypto ipsec sa command and see the following output. What does this output suggest? interfacE. Tunnel100 Crypto map tag: Tunnel100-head-0, local addr 10.10.10.10 protected vrF. (none) local ident (addr/mask/prot/port): (10.10.10.10/255.255.255.255/47/0)...
Which protocol supports high availability in a Cisco IOS SSL VPN environment?
Which protocol supports high availability in a Cisco IOS SSL VPN environment?A . HSRPB . VRRPC . GLBPD . IRDPView AnswerAnswer: A