What are two forms of SSL VPN? (Choose two.)

What are two forms of SSL VPN? (Choose two.)A . port forwardingB . Full Tunnel ModeC . Cisco IOS WebVPND . Cisco AnyConnectView AnswerAnswer: CD

September 13, 2018 No Comments READ MORE +

Which authentication method was used by the remote peer to prove its identity?

Refer to the exhibit. Which authentication method was used by the remote peer to prove its identity?A . Extensible Authentication ProtocolB . certificate authenticationC . pre-shared keyD . XAUTHView AnswerAnswer: C

September 13, 2018 No Comments READ MORE +

What is the most possible cause of this problem?

The Cisco AnyConnect client fails to connect via IKEv2 but works with SSL. The following error message is displayed: "Login Denied, unauthorized connection mechanism, contact your administrator" What is the most possible cause of this problem?A . DAP is terminating the connection because IKEv2 is the protocol that is being...

September 12, 2018 No Comments READ MORE +

Regarding licensing, which option will allow IKEv2 connections on the adaptive security appliance?

Regarding licensing, which option will allow IKEv2 connections on the adaptive security appliance?A . AnyConnect Essentials can be used for Cisco AnyConnect IKEv2 connections.B . IKEv2 sessions are not licensed.C . The Advanced Endpoint Assessment license must be installed to allow Cisco AnyConnect IKEv2 sessions.D . Cisco AnyConnect Mobile must...

September 11, 2018 No Comments READ MORE +

An internet-based VPN solution is being considered to replace an existing private WAN connecting remote offices. A multimedia application is used that relies on multicast for communication. Which two VPN solutions meet the application's network requirement? (Choose two.)

An internet-based VPN solution is being considered to replace an existing private WAN connecting remote offices. A multimedia application is used that relies on multicast for communication. Which two VPN solutions meet the application's network requirement? (Choose two.)A . FlexVPNB . DMVPNC . Group Encrypted Transport VPND . Crypto-map based...

September 11, 2018 No Comments READ MORE +

What is the default storage location of user-level bookmarks in an IOS clientless SSL VPN?

What is the default storage location of user-level bookmarks in an IOS clientless SSL VPN?A . disk0:/webvpn/{context name}/B . disk1:/webvpn/{context name}/C . flash:/webvpn/{context name}/D . nvram:/webvpn/{context name}/View AnswerAnswer: C

September 11, 2018 No Comments READ MORE +

Which cryptographic algorithms are approved to protect Top Secret information?

Which cryptographic algorithms are approved to protect Top Secret information?A . HIPPA DESB . AES-128C . RC4-128D . AES-256View AnswerAnswer: D

September 10, 2018 No Comments READ MORE +

Which two statements describe effects of the DoNothing option within the untrusted network policy on a Cisco AnyConnect profile? (Choose two.)

Which two statements describe effects of the DoNothing option within the untrusted network policy on a Cisco AnyConnect profile? (Choose two.)A . The client initiates a VPN connection upon detection of an untrusted network.B . The client initiates a VPN connection upon detection of a trusted network.C . The always-on...

September 8, 2018 No Comments READ MORE +

Which hash algorithm is required to protect classified information?

Which hash algorithm is required to protect classified information?A . MD5B . SHA-1C . SHA-256D . SHA-384View AnswerAnswer: D

September 7, 2018 No Comments READ MORE +

Which three settings are required for crypto map configuration? (Choose three.)

Which three settings are required for crypto map configuration? (Choose three.)A . match addressB . set peerC . set transform-setD . set security-association lifetimeE . set security-association level per-hostF . set pfsView AnswerAnswer: A, B, C

September 7, 2018 No Comments READ MORE +