A company needs to provide secure access to its remote workforce. The end users use public kiosk computers and a wide range of devices. They will be accessing only an internal web application. Which VPN solution satisfies these requirements?
A company needs to provide secure access to its remote workforce. The end users use public kiosk computers and a wide range of devices. They will be accessing only an internal web application. Which VPN solution satisfies these requirements?A . Clientless SSLVPNB . AnyConnect Client using SSLVPNC . AnyConnect Client...
Which three settings are required for crypto map configuration? (Choose three.)
Which three settings are required for crypto map configuration? (Choose three.)A . match addressB . set peerC . set transform-setD . set security-association lifetimeE . set security-association level per-hostF . set pfsView AnswerAnswer: A, B, C
What does NHRP stand for?
What does NHRP stand for?A . Next Hop Resolution ProtocolB . Next Hop Registration ProtocolC . Next Hub Routing ProtocolD . Next Hop Routing ProtocolView AnswerAnswer: A
Which of the following could be used to configure remote access VPN Host-scan and pre-login policies?
Which of the following could be used to configure remote access VPN Host-scan and pre-login policies?A . ASDMB . Connection-profile CLI commandC . Host-scan CLI command under the VPN group policyD . Pre-login-check CLI commandView AnswerAnswer: A
What are two variables for configuring clientless SSL VPN single sign-on? (Choose two.)
What are two variables for configuring clientless SSL VPN single sign-on? (Choose two.)A . CSCO_WEBVPN_OTP_PASSWORDB . CSCO_WEBVPN_INTERNAL_PASSWORDC . CSCO_WEBVPN_USERNAMED . CSCO_WEBVPN_RADIUS_USERView AnswerAnswer: B, C
When an IPsec SVTI is configured, which technology processes traffic forwarding for encryption?
When an IPsec SVTI is configured, which technology processes traffic forwarding for encryption?A . ACLB . IP routingC . RRID . front door VPN routing and forwardingView AnswerAnswer: B
Which four activities does the Key Server perform in a GETVPN deployment? (Choose four.)
Which four activities does the Key Server perform in a GETVPN deployment? (Choose four.)A . authenticates group membersB . manages security policyC . creates group keysD . distributes policy/keysE . encrypts endpoint trafficF . receives policy/keysG . defines group membersView AnswerAnswer: A, B, C, D
What are the three primary components of a GET VPN network? (Choose three.)
What are the three primary components of a GET VPN network? (Choose three.)A . Group Domain of Interpretation protocolB . Simple Network Management ProtocolC . server load balancerD . accounting serverE . group memberF . key serverView AnswerAnswer: A, E, F
What is the Cisco recommended TCP maximum segment on a DMVPN tunnel interface when the MTU is set to 1400 bytes?
What is the Cisco recommended TCP maximum segment on a DMVPN tunnel interface when the MTU is set to 1400 bytes?A . 1160 bytesB . 1260 bytesC . 1360 bytesD . 1240 bytesView AnswerAnswer: C
Which technology supports tunnel interfaces while remaining compatible with legacy VPN implementations?
Which technology supports tunnel interfaces while remaining compatible with legacy VPN implementations?A . FlexVPNB . DMVPNC . GET VPND . SSL VPNView AnswerAnswer: A