What is the name of the transform set being used on the ISR?
What is the name of the transform set being used on the ISR?A . DefaultB . ESP-AESESP-SHA-HMACC . SP-AES-256-MD5-TRANSD . TSETView AnswerAnswer: B
Which split-tunnel policy allows remote client to use their local provider for Internet access when working from home?
An engineer notices that while an employee is connected remotely, all traffic is being routed to the corporate network. Which split-tunnel policy allows remote client to use their local provider for Internet access when working from home?A . No policy allows that type of configurationB . tunnelspecifiedC . excludespecifiedD ....
Which VPN technology preserves IP headers and prevents overlay routing?
Which VPN technology preserves IP headers and prevents overlay routing?A . site-to-site VPNB . GET VPNC . Cisco Easy VPND . DMVPNView AnswerAnswer: B
Which no tunneled technology can be used to satisfy this requirement?
A company's remote locations connect to data centers via MPLS. A new request requires that unicast traffic that exist the remote location be encrypted. Which no tunneled technology can be used to satisfy this requirement?A . SSLB . GET VPNC . DMVPND . EzVPNView AnswerAnswer: B
Which VPN technology produces this configuration output?
Refer to the exhibit. Which VPN technology produces this configuration output?A . DVTIB . SVTIC . DMVPND . FlexVPNView AnswerAnswer: C
Which cause of this behavior is true?
Refer to the Exhibit: Users at each end of this VPN tunnel cannot communicate with each other. Which cause of this behavior is true?A . The Diffie-Hellman groups configured are different.B . The pre shared key does not match.C . Phase 1 is not completed and troubleshooting is required.D ....
Which protocol must be used?
An engineer is configuring high availability for crypto-map-based site-to-site VPNs on Cisco devices. Which protocol must be used?A . VRRPB . BFDC . ESPD . HSRPView AnswerAnswer: D
Which benefit of ECC as compared to RSA is true?
Which benefit of ECC as compared to RSA is true?A . requires multiple keysB . supports Clientless SSL VPNC . can provide higher security at a lower computational costD . can be used on Cisco ASA and Cisco IOS deviceView AnswerAnswer: C Explanation: Reference: https://blogs.cisco.com/security/next-generation-encryption
Which feature do you configure?
You need to configure your company’s client VPN access to send antivirus client update traffic directly to a vendor’s cloud server. All other traffic must go to the corporate network. Which feature do you configure?A . split tunnelB . smart tunnelC . full tunnelD . Split DNSView AnswerAnswer: A
Which command must be run on the ASA to verify this information?
While attempting to establish a site-to-site VPN, the engineer notices that phase 1 of the VPN tunnel fails. The engineer wants to run a capture to confirm that the outside interface is receiving phase 1information from the thirdparty peer address. Which command must be run on the ASA to verify...