A company needs to provide secure access to its remote workforce. The end users use public kiosk computers and a wide range of devices. They will be accessing only an internal web application. Which VPN solution satisfies these requirements?

A company needs to provide secure access to its remote workforce. The end users use public kiosk computers and a wide range of devices. They will be accessing only an internal web application. Which VPN solution satisfies these requirements?A . Clientless SSLVPNB . AnyConnect Client using SSLVPNC . AnyConnect Client...

October 17, 2018 No Comments READ MORE +

Which three settings are required for crypto map configuration? (Choose three.)

Which three settings are required for crypto map configuration? (Choose three.)A . match addressB . set peerC . set transform-setD . set security-association lifetimeE . set security-association level per-hostF . set pfsView AnswerAnswer: A, B, C

October 17, 2018 No Comments READ MORE +

What does NHRP stand for?

What does NHRP stand for?A . Next Hop Resolution ProtocolB . Next Hop Registration ProtocolC . Next Hub Routing ProtocolD . Next Hop Routing ProtocolView AnswerAnswer: A

October 16, 2018 No Comments READ MORE +

Which of the following could be used to configure remote access VPN Host-scan and pre-login policies?

Which of the following could be used to configure remote access VPN Host-scan and pre-login policies?A . ASDMB . Connection-profile CLI commandC . Host-scan CLI command under the VPN group policyD . Pre-login-check CLI commandView AnswerAnswer: A

October 16, 2018 No Comments READ MORE +

What are two variables for configuring clientless SSL VPN single sign-on? (Choose two.)

What are two variables for configuring clientless SSL VPN single sign-on? (Choose two.)A . CSCO_WEBVPN_OTP_PASSWORDB . CSCO_WEBVPN_INTERNAL_PASSWORDC . CSCO_WEBVPN_USERNAMED . CSCO_WEBVPN_RADIUS_USERView AnswerAnswer: B, C

October 15, 2018 No Comments READ MORE +

When an IPsec SVTI is configured, which technology processes traffic forwarding for encryption?

When an IPsec SVTI is configured, which technology processes traffic forwarding for encryption?A . ACLB . IP routingC . RRID . front door VPN routing and forwardingView AnswerAnswer: B

October 14, 2018 No Comments READ MORE +

Which four activities does the Key Server perform in a GETVPN deployment? (Choose four.)

Which four activities does the Key Server perform in a GETVPN deployment? (Choose four.)A . authenticates group membersB . manages security policyC . creates group keysD . distributes policy/keysE . encrypts endpoint trafficF . receives policy/keysG . defines group membersView AnswerAnswer: A, B, C, D

October 12, 2018 No Comments READ MORE +

What are the three primary components of a GET VPN network? (Choose three.)

What are the three primary components of a GET VPN network? (Choose three.)A . Group Domain of Interpretation protocolB . Simple Network Management ProtocolC . server load balancerD . accounting serverE . group memberF . key serverView AnswerAnswer: A, E, F

October 10, 2018 No Comments READ MORE +

What is the Cisco recommended TCP maximum segment on a DMVPN tunnel interface when the MTU is set to 1400 bytes?

What is the Cisco recommended TCP maximum segment on a DMVPN tunnel interface when the MTU is set to 1400 bytes?A . 1160 bytesB . 1260 bytesC . 1360 bytesD . 1240 bytesView AnswerAnswer: C

October 10, 2018 No Comments READ MORE +

Which technology supports tunnel interfaces while remaining compatible with legacy VPN implementations?

Which technology supports tunnel interfaces while remaining compatible with legacy VPN implementations?A . FlexVPNB . DMVPNC . GET VPND . SSL VPNView AnswerAnswer: A

October 10, 2018 No Comments READ MORE +