What are two forms of SSL VPN? (Choose two.)
What are two forms of SSL VPN? (Choose two.)A . port forwardingB . Full Tunnel ModeC . Cisco IOS WebVPND . Cisco AnyConnectView AnswerAnswer: CD
Which authentication method was used by the remote peer to prove its identity?
Refer to the exhibit. Which authentication method was used by the remote peer to prove its identity?A . Extensible Authentication ProtocolB . certificate authenticationC . pre-shared keyD . XAUTHView AnswerAnswer: C
What is the most possible cause of this problem?
The Cisco AnyConnect client fails to connect via IKEv2 but works with SSL. The following error message is displayed: "Login Denied, unauthorized connection mechanism, contact your administrator" What is the most possible cause of this problem?A . DAP is terminating the connection because IKEv2 is the protocol that is being...
Regarding licensing, which option will allow IKEv2 connections on the adaptive security appliance?
Regarding licensing, which option will allow IKEv2 connections on the adaptive security appliance?A . AnyConnect Essentials can be used for Cisco AnyConnect IKEv2 connections.B . IKEv2 sessions are not licensed.C . The Advanced Endpoint Assessment license must be installed to allow Cisco AnyConnect IKEv2 sessions.D . Cisco AnyConnect Mobile must...
An internet-based VPN solution is being considered to replace an existing private WAN connecting remote offices. A multimedia application is used that relies on multicast for communication. Which two VPN solutions meet the application's network requirement? (Choose two.)
An internet-based VPN solution is being considered to replace an existing private WAN connecting remote offices. A multimedia application is used that relies on multicast for communication. Which two VPN solutions meet the application's network requirement? (Choose two.)A . FlexVPNB . DMVPNC . Group Encrypted Transport VPND . Crypto-map based...
What is the default storage location of user-level bookmarks in an IOS clientless SSL VPN?
What is the default storage location of user-level bookmarks in an IOS clientless SSL VPN?A . disk0:/webvpn/{context name}/B . disk1:/webvpn/{context name}/C . flash:/webvpn/{context name}/D . nvram:/webvpn/{context name}/View AnswerAnswer: C
Which cryptographic algorithms are approved to protect Top Secret information?
Which cryptographic algorithms are approved to protect Top Secret information?A . HIPPA DESB . AES-128C . RC4-128D . AES-256View AnswerAnswer: D
Which two statements describe effects of the DoNothing option within the untrusted network policy on a Cisco AnyConnect profile? (Choose two.)
Which two statements describe effects of the DoNothing option within the untrusted network policy on a Cisco AnyConnect profile? (Choose two.)A . The client initiates a VPN connection upon detection of an untrusted network.B . The client initiates a VPN connection upon detection of a trusted network.C . The always-on...
Which hash algorithm is required to protect classified information?
Which hash algorithm is required to protect classified information?A . MD5B . SHA-1C . SHA-256D . SHA-384View AnswerAnswer: D
Which three settings are required for crypto map configuration? (Choose three.)
Which three settings are required for crypto map configuration? (Choose three.)A . match addressB . set peerC . set transform-setD . set security-association lifetimeE . set security-association level per-hostF . set pfsView AnswerAnswer: A, B, C