Which two parameters are configured within an IKEv2 proposal on an IOS router? (Choose two.)

Which two parameters are configured within an IKEv2 proposal on an IOS router? (Choose two.)A . authenticationB . encryptionC . integrityD . lifetimeView AnswerAnswer: B, C

October 7, 2018 No Comments READ MORE +

If the IKEv2 tunnel were to establish successfully, which encryption algorithm would be used to encrypt traffic?

If the IKEv2 tunnel were to establish successfully, which encryption algorithm would be used to encrypt traffic?A . DESB . 3DESC . AESD . AES192E . AES256View AnswerAnswer: E Explanation: Both ASA’s are configured to support AES 256, so during the IPSec negotiation they will use the strongest algorithm that...

October 7, 2018 No Comments READ MORE +

If the IKEv2 tunnel were to establish successfully, which encryption algorithm would be used to encrypt traffic?

If the IKEv2 tunnel were to establish successfully, which encryption algorithm would be used to encrypt traffic?A . DESB . 3DESC . AESD . AES192E . AES256View AnswerAnswer: E Explanation: Both ASA’s are configured to support AES 256, so during the IPSec negotiation they will use the strongest algorithm that...

October 6, 2018 No Comments READ MORE +

To change the title panel on the logon page of the Cisco IOS WebVPN portal, which file must you configure?

To change the title panel on the logon page of the Cisco IOS WebVPN portal, which file must you configure?A . Cisco IOS WebVPN customization templateB . Cisco IOS WebVPN customization generalC . web-access-hlp.incD . app-access-hlp.incView AnswerAnswer: A

October 6, 2018 No Comments READ MORE +

What is a possible cause of the connection failure?

Consider this scenario. When users attempt to connect via a Cisco AnyConnect VPN session, the certificate has changed and the connection fails. What is a possible cause of the connection failure?A . An invalid modulus was used to generate the initial key.B . The VPN is using an expired certificate.C...

October 3, 2018 No Comments READ MORE +

Which cryptographic algorithms are approved to protect Top Secret information?

Which cryptographic algorithms are approved to protect Top Secret information?A . HIPPA DESB . AES-128C . RC4-128D . AES-256View AnswerAnswer: D

October 2, 2018 No Comments READ MORE +

An IPsec peer is exchanging routes using IKEv2, but the routes are not installed in the RIB. Which configuration error is causing the failure?

Refer to the exhibit. An IPsec peer is exchanging routes using IKEv2, but the routes are not installed in the RIB. Which configuration error is causing the failure?A . IKEv2 routing requires certificate authentication, not pre-shared keys.B . An invalid administrative distance value was configured.C . The match identity command...

October 2, 2018 No Comments READ MORE +

Which two GDOI encryption keys are used within a GET VPN network? (Choose two.)

Which two GDOI encryption keys are used within a GET VPN network? (Choose two.)A . key encryption keyB . group encryption keyC . user encryption keyD . traffic encryption keyView AnswerAnswer: A, D

October 1, 2018 No Comments READ MORE +

Which option shows the correct traffic selectors for the child SA on the remote ASA, when the headquarter ASA initiates the tunnel?

Which option shows the correct traffic selectors for the child SA on the remote ASA, when the headquarter ASA initiates the tunnel?A . Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 192.168.20.0/0-192.168.20.255/65535B . Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 192.168.22.0/0-192.168.22.255/65535C . Local selector 192.168.22.0/0-192.168.22.255/65535 Remote selector 192.168.33.0/0-192.168.33.255/65535D . Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 0.0.0.0/0...

October 1, 2018 No Comments READ MORE +

In DMVPN phase 2, which two EIGRP features need to be disabled on the hub to allow spoke-to-spoke communication? (Choose two.)

In DMVPN phase 2, which two EIGRP features need to be disabled on the hub to allow spoke-to-spoke communication? (Choose two.)A . autosummaryB . split horizonC . metric calculation using bandwidthD . EIGRP address familyE . next-hop-selfF . default administrative distanceView AnswerAnswer: B, E

October 1, 2018 No Comments READ MORE +