Which description of how DTLS improves application performance is true?

Which description of how DTLS improves application performance is true?A . uses connection-oriented sessionsB . creates less overhead by using UDPC . avoids bandwidth and latency issuesD . uses a flow control mechanismView AnswerAnswer: C Explanation: Reference: https://learningnetwork.cisco.com/thread/21470

December 6, 2019 No Comments READ MORE +

Which VPN solution enables you to publish applications to users by using bookmarks?

Which VPN solution enables you to publish applications to users by using bookmarks?A . IPsec clientB . SSL VPN full network accessC . Clientless SSL VPND . port forwardView AnswerAnswer: C

December 6, 2019 No Comments READ MORE +

Which two IKV1 parameter must match on both peers?

An engineer is configuring a site-t-site VPM tunnel. Which two IKV1 parameter must match on both peers? (Choose two.A . encryption algorithmB . access listsC . encryption domainsD . QoSE . hashing methodView AnswerAnswer: A,E

December 6, 2019 No Comments READ MORE +

Which protocol accomplishes this goal?

An engineer is configuring IPsec VPN and wants to choose an authentication protocol that is reliable supports ACK and sequence. Which protocol accomplishes this goal?A . ESPB . AES-192C . IKEv1D . AES-256View AnswerAnswer: A

December 5, 2019 No Comments READ MORE +

Which no tunneled technology can be used to satisfy this requirement?

A company's remote locations connect to data centers via MPLS. A new request requires that unicast traffic that exist the remote location be encrypted. Which no tunneled technology can be used to satisfy this requirement?A . SSLB . GET VPNC . DMVPND . EzVPNView AnswerAnswer: B

December 5, 2019 No Comments READ MORE +

Which option is the main difference between GET VPN and DMVPN?

Which option is the main difference between GET VPN and DMVPN?A . AES encryption supportB . dynamic spoke-to-spoke tunnel communicationsC . Next Hop Resolution ProtocolD . Group Domain of Interpretation protocolView AnswerAnswer: B

December 5, 2019 No Comments READ MORE +

What is the name of the transform set being used on the ISR?

What is the name of the transform set being used on the ISR?A . DefaultB . ESP-AESESP-SHA-HMACC . SP-AES-256-MD5-TRANSD . TSETView AnswerAnswer: B

December 5, 2019 No Comments READ MORE +

Which VPN technology allows a shared IPsec SA to be used?

An engineer must set up a site-to-site VPN implementation with an any-to-any topology that provides secures routing across the router backbone. Which VPN technology allows a shared IPsec SA to be used?A . FilexVPNB . IPsec VPNC . GET VPND . DMVPNView AnswerAnswer: C

December 4, 2019 No Comments READ MORE +

Which two configurations do you implement in Cisco AnyConnect?

Your company network security policy requires that all network traffic be tunneled to the corporate office. End users must be able to access local LAN resources when they connect to the corporate network. Which two configurations do you implement in Cisco AnyConnect? (Choose two.)A . split-exclude tunnelingB . local LAN...

December 4, 2019 No Comments READ MORE +

Which action do you take to allow EIGRP to advertise all routes between the hub and all the spokes?

You must implement DMVPN Phase 3 by using EIGRP as the dynamic routing protocol for the tunnel overlay. Which action do you take to allow EIGRP to advertise all routes between the hub and all the spokes?A . Summarize routes from the hub to the spokes.B . Disable split-horizon for...

December 4, 2019 No Comments READ MORE +