Which two qualify as Next Generation Encryption integrity algorithms? (Choose two.)

Which two qualify as Next Generation Encryption integrity algorithms? (Choose two.)A . SHA-512B . SHA-256C . SHA-192D . SHA-380E . SHA-192F . SHA-196View AnswerAnswer: A, B

December 7, 2018 No Comments READ MORE +

The IKEv2 tunnel between Router1 and Router2 is failing during session establishment. Which action will allow the session to establish correctly?

Refer to the exhibit. The IKEv2 tunnel between Router1 and Router2 is failing during session establishment. Which action will allow the session to establish correctly?A . The address command on Router2 must be narrowed down to a /32 mask.B . The local and remote keys on Router2 must be switched.C...

December 6, 2018 No Comments READ MORE +

Which protocol supports high availability in a Cisco IOS SSL VPN environment?

Which protocol supports high availability in a Cisco IOS SSL VPN environment?A . HSRPB . VRRPC . GLBPD . IRDPView AnswerAnswer: A

December 6, 2018 No Comments READ MORE +

Which two cryptographic technologies are recommended for use with FlexVPN? (Choose two.)

Which two cryptographic technologies are recommended for use with FlexVPN? (Choose two.)A . SHA (HMAC variant)B . Diffie-HellmanC . DESD . MD5 (HMAC variant)View AnswerAnswer: A, B

December 4, 2018 No Comments READ MORE +

Which Cisco ASDM option configures forwarding syslog messages to email?

Which Cisco ASDM option configures forwarding syslog messages to email?A . Configuration > Device Management > Logging > E-Mail SetupB . Configuration > Device Management > E-Mail Setup > Logging EnableC . Select the syslogs to email, click Edit, and select the Forward Messages option.D . Select the syslogs to...

December 3, 2018 No Comments READ MORE +

Which NGE IKE Diffie-Hellman group identifier has the strongest cryptographic properties?

Which NGE IKE Diffie-Hellman group identifier has the strongest cryptographic properties?A . group 10B . group 24C . group 5D . group 20View AnswerAnswer: D

December 2, 2018 No Comments READ MORE +

Which algorithm is replaced by elliptic curve cryptography in Cisco NGE?

Which algorithm is replaced by elliptic curve cryptography in Cisco NGE?A . 3DESB . AESC . DESD . RSAView AnswerAnswer: D

December 1, 2018 No Comments READ MORE +

An administrator is adding IPv6 addressing to an already functioning tunnel. The administrator is unable to ping 2001:DB8:100::2 but can ping 209.165.200.226. Which configuration needs to be added or changed?

Refer to the exhibit. An administrator is adding IPv6 addressing to an already functioning tunnel. The administrator is unable to ping 2001:DB8:100::2 but can ping 209.165.200.226. Which configuration needs to be added or changed?A . No configuration change is necessary. Everything is working correctly.B . OSPFv3 needs to be configured...

November 27, 2018 No Comments READ MORE +

After completing a site-to-site VPN setup between two routers, application performance over the tunnel is slow. You issue the show crypto ipsec sa command and see the following output. What does this output suggest?

After completing a site-to-site VPN setup between two routers, application performance over the tunnel is slow. You issue the show crypto ipsec sa command and see the following output. What does this output suggest? interfacE. Tunnel100 Crypto map tag: Tunnel100-head-0, local addr 10.10.10.10 protected vrF. (none) local ident (addr/mask/prot/port): (10.10.10.10/255.255.255.255/47/0)...

November 27, 2018 No Comments READ MORE +

Which protocol supports high availability in a Cisco IOS SSL VPN environment?

Which protocol supports high availability in a Cisco IOS SSL VPN environment?A . HSRPB . VRRPC . GLBPD . IRDPView AnswerAnswer: A

November 25, 2018 No Comments READ MORE +