<< Prev Question Next Question >>

Question 104/254

An administrator desires that when work laptops are not connected to the corporate network, they should automatically initiate an AnyConnect VPN tunnel back to headquarters. Where does the administrator configure this?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (254q)
Question 1: When you troubleshoot Cisco AnyConnect, which step does Cisc...
Question 2: Which Cisco IOS feature provides secure, on-demand meshed co...
Question 3: Refer to the exhibit. (Exhibit) The IKEv2 tunnel between Rou...
Question 4: Where is split-tunneling defined for remote access clients o...
Question 5: Which hash algorithm is required to protect classified infor...
Question 6: A custom desktop application needs to access an internal ser...
Question 7: SIMULATION Scenario: You are the network security manager fo...
Question 8: Which statement about the hub in a DMVPN configuration with ...
Question 9: Which option describes the purpose of the shared argument in...
Question 10: Which type of NHRP packet is unique to Phase 3 DMVPN topolog...
Question 11: Scenario: You are the senior network security administrator ...
Question 12: (Exhibit) When a tunnel is initiated by the headquarter ASA,...
Question 13: A private wan connection is suspected of intermittently corr...
Question 14: Instructions Enter CLI commands on the ASA and Branch router...
Question 15: To change the title panel on the logon page of the Cisco IOS...
Question 16: Which statement regarding GET VPN is true?...
Question 17: You are configuring a Cisco IOS SSL VPN gateway to operate w...
Question 18: When Cisco ASA applies VPN permissions, what is the first se...
Question 19: Which feature enforces the corporate policy for Internet acc...
Question 20: Which technology can you implement to reduce latency issues ...
Question 21: What URL do you use to download a packet capture file in a f...
Question 22: Refer to the exhibit. (Exhibit) You executed the show crypto...
Question 23: Which transform set is contained in the IKEv2 default propos...
Question 24: An internet-based VPN solution is being considered to replac...
Question 25: A rogue static route is installed in the routing table of a ...
Question 26: Which two statements about the Cisco ASA Clientless SSL VPN ...
Question 27: In a spoke-to-spoke DMVPN topology, which type of interface ...
Question 28: What does NHRP stand for?
Question 29: Refer to the exhibit. Given the partial configuration shown,...
Question 30: Which feature is a benefit of Dynamic Multipoint VPN?...
Question 31: Which two statements about the Cisco ASA Clientless SSL VPN ...
Question 32: Which algorithm provides both encryption and authentication ...
Question 33: Which three commands are included in the command show dmvpn ...
Question 34: Which VPN type can be used to provide secure remote access f...
Question 35: Refer to the exhibit. (Exhibit) Which action is demonstrated...
Question 36: An IOS SSL VPN is configured to forward TCP ports. A remote ...
Question 37: Which option is an example of an asymmetric algorithm?...
Question 38: Scenario: You are the senior network security administrator ...
Question 39: Which protocol supports high availability in a Cisco IOS SSL...
Question 40: Refer to the exhibit. (Exhibit) The customer needs to launch...
Question 41: With Cisco ASA active/standby failover, by default, how many...
Question 42: Which protocol must be enabled on the inside interface to us...
Question 43: Which two cryptographic technologies are recommended for use...
Question 44: Which two types of authentication are supported when you use...
Question 45: Refer to the exhibit. (Exhibit) An IPsec peer is exchanging ...
Question 46: Which three parameters are specified in the isakmp (IKEv1) p...
Question 47: In a GET VPN solution, which two ways can the key server dis...
Question 48: Which is used by GETVPN, FlexVPN and DMVPN?...
Question 49: Which Cisco ASDM option configures WebVPN access on a Cisco ...
Question 50: Which two are features of GETVPN but not DMVPN and FlexVPN? ...
Question 51: An engineer is configuring an IPsec VPN with IKEv2. Which th...
Question 52: Scenario: You are the senior network security administrator ...
Question 53: Which three configurations are prerequisites for stateful fa...
Question 54: Which are two main use cases for Clientless SSL VPN? (Choose...
Question 55: When troubleshooting clientless SSL VPN connections, which c...
Question 56: Which three parameters must match on all routers in a DMVPN ...
Question 57: A user is experiencing issues connecting to a Cisco AnyConne...
Question 58: Refer to the exhibit. (Exhibit) What technology does the giv...
Question 59: A customer requires all traffic to go through a VPN. However...
Question 60: Which VPN solution is best for a collection of branch office...
Question 61: Refer to the exhibit. (Exhibit) Which type of mismatch is ca...
Question 62: Which DAP endpoint attribute checks for the matching MAC add...
Question 63: SIMULATION (Exhibit)
Question 64: In the Diffie-Hellman protocol, which type of key is the sha...
Question 65: When you configure IPsec VPN High Availability Enhancements,...
Question 66: Remote users want to access internal servers behind an ASA u...
Question 67: Which technology supports tunnel interfaces while remaining ...
Question 68: Which cryptographic algorithms are a part of the Cisco NGE s...
Question 69: In the Cisco ASDM interface, where do you enable the DTLS pr...
Question 70: If Web VPN bookmarks are grayed out on the home screen, whic...
Question 71: Which three plugins are available for clientless SSL VPN? (C...
Question 72: Which two changes must be made to migrate from DMVPN Phase 2...
Question 73: Which adaptive security appliance command can be used to see...
Question 74: In DMVPN phase 2, which two EIGRP features need to be disabl...
Question 75: Consider this scenario. When users attempt to connect via a ...
Question 76: Which command simplifies the task of converting an SSL VPN t...
Question 77: An engineer wants to ensure that employees cannot access cor...
Question 78: Which protocol can be used for better throughput performance...
Question 79: Which two parameters help to map a VPN session to a tunnel g...
Question 80: Which type of communication in a FlexVPN implementation uses...
Question 81: Refer to the exhibit. (Exhibit) An administrator had the abo...
Question 82: Which technology does a multipoint GRE interface require to ...
Question 83: Which technology must be installed on the client computer to...
Question 84: When an IPsec SVTI is configured, which technology processes...
Question 85: Which two parameters are configured within an IKEv2 proposal...
Question 86: Using the Next Generation Encryption technologies, which is ...
Question 87: Which command configures IKEv2 symmetric identity authentica...
Question 88: What are two variables for configuring clientless SSL VPN si...
Question 89: Which command enables the router to form EIGRP neighbor adja...
Question 90: Which Cisco ASA platform should be selected if the requireme...
Question 91: Which two operational advantages does GetVPN offer over site...
Question 92: Refer to the exhibit. (Exhibit) Which authentication method ...
Question 93: A user is unable to establish an AnyConnect VPN connection t...
Question 94: Where do you configure AnyConnect certificate-based authenti...
Question 95: Which two statements describe effects of the DoNothing optio...
Question 96: Regarding licensing, which option will allow IKEv2 connectio...
Question 97: A network engineer is troubleshooting a site-to-site VPN tun...
Question 98: In FlexVPN, what command can an administrator use to create ...
Question 99: Scenario Your organization has just implemented a Cisco AnyC...
Question 100: Which command specifies the path to the Host Scan package in...
Question 101: A spoke has two Internet connections for failover. How can y...
Question 102: Scenario: You are the senior network security administrator ...
Question 103: Which two examples of transform sets are contained in the IK...
Question 104: An administrator desires that when work laptops are not conn...
Question 105: The Cisco AnyConnect client is unable to download an updated...
Question 106: Which command is used to determine how many GMs have registe...
Question 107: %CRYPTO-4-PKT_REPLAY_ERR: decrypt: replay check failed conne...
Question 108: Which Cisco adaptive security appliance command can be used ...
Question 109: Which two IKEv1 policy options must match on each peer when ...
Question 110: (Exhibit) Refer to the exhibit. In this tunnel mode GRE mult...
Question 111: Which four activities does the Key Server perform in a GETVP...
Question 112: SIMULATION Scenario You are the network security administrat...
Question 113: A Cisco router may have a fan issue that could increase its ...
Question 114: An engineer has integrated a new DMVPN to link remote office...
Question 115: What action does the hub take when it receives a NHRP resolu...
Question 116: Refer to the exhibit. (Exhibit) Which VPN solution does this...
Question 117: Refer to the exhibit. (Exhibit) The customer can establish a...
Question 118: Which VPN feature allows remote access clients to print docu...
Question 119: Which protocol does DTLS use for its transport?...
Question 120: What are three benefits of deploying a GET VPN? (Choose thre...
Question 121: Refer to the exhibit. (Exhibit) Which statement about the gi...
Question 122: As network security architect, you must implement secure VPN...
Question 123: Which NGE IKE Diffie-Hellman group identifier has the strong...
Question 124: Which three types of web resources or protocols are enabled ...
Question 125: What is the default storage location of user-level bookmarks...
Question 126: Refer to the exhibit. (Exhibit) Which exchange does this deb...
Question 127: Which command clears all Cisco AnyConnect VPN session on a C...
Question 128: Which two options are purposes of the key server in Cisco IO...
Question 129: An engineer is troubleshooting a DMVPN spoke router and sees...
Question 130: Which two technologies are considered to be Suite B cryptogr...
Question 131: Which feature is available in IKEv1 but not IKEv2?...
Question 132: An administrator wishes to limit the networks reachable over...
Question 133: Which three types of SSO functionality are available on the ...
Question 134: Which alogrithm is an example of asymmetric encryption?...
Question 135: Refer to the exhibit. (Exhibit) Which VPN solution does this...
Question 136: Instructions Enter CLI commands on the ASA and Branch router...
Question 137: Which two RADIUS attributes are needed for a VRF-aware FlexV...
Question 138: Which command identifies an AnyConnect profile that was uplo...
Question 139: Which two are characteristics of GETVPN? (Choose two.)...
Question 140: A network administrator is configuring AES encryption for th...
Question 141: The following configuration steps have been completeD. WebVP...
Question 142: A network is configured to allow clientless access to resour...
Question 143: On which type of encrypted traffic can a Cisco ASA appliance...
Question 144: Which statement is true when implementing a router with a dy...
Question 145: Which functionality is provided by L2TPv3 over FlexVPN?...
Question 146: In FlexVPN, what is the role of a NHRP resolution request?...
Question 147: A Cisco IOS SSL VPN gateway is configured to operate in clie...
Question 148: In which situation would you enable the Smart Tunnel option ...
Question 149: Which Cisco ASDM option configures forwarding syslog message...
Question 150: Which command can you use to monitor the phase 1 establishme...
Question 151: What are two forms of SSL VPN? (Choose two.)...
Question 152: Refer to the exhibit. What is the problem with the IKEv2 sit...
Question 153: Which three remote access VPN methods in an ASA appliance pr...
Question 154: Which of the following could be used to configure remote acc...
Question 155: Which feature is enabled by the use of NHRP in a DMVPN netwo...
Question 156: What must be enabled in the web browser of the client comput...
Question 157: You have deployed new Cisco AnyConnect start before logon mo...
Question 158: Which command clears all Cisco AnyConnect VPN sessions?...
Question 159: Which of these are the two types of keys used when implement...
Question 160: Refer to the exhibit. (Exhibit) An administrator is adding I...
Question 161: What are two benefits of DMVPN Phase 3? (Choose two.)...
Question 162: Which IKEv2 feature minimizes the configuration of a FlexVPN...
Question 163: Which option is a possible solution if you cannot access a U...
Question 164: Which Cisco ASA SSL VPN feature provides support for PCI com...
Question 165: Which option is most effective at preventing a remote access...
Question 166: Which option describes what address preservation with IPsec ...
Question 167: Refer to the exhibit. (Exhibit) Which two characteristics of...
Question 168: Which two command are included in the command show dmvpn det...
Question 169: Which interface is managed by the VPN Access Interface field...
Question 170: (Exhibit) Based on the provided ASDM configuration for the r...
Question 171: (Exhibit) Refer to the exhibit. A network administrator is r...
Question 172: The Cisco ASA software image has been erased from flash memo...
Question 173: Which other match command is used with the match flow ip des...
Question 174: (Exhibit) Refer to the exhibit. An engineer is troubleshooti...
Question 175: Which technology can rate-limit the number of tunnels on a D...
Question 176: Refer to the exhibit. (Exhibit) What is the purpose of the g...
Question 177: Which option describes the purpose of the command show deriv...
Question 178: Refer to the exhibit. (Exhibit) Which VPN solution does this...
Question 179: (Exhibit) Refer to the exhibit. Client 1 cannot communicate ...
Question 180: Which equation describes an elliptic curve?...
Question 181: Which two statements regarding IKEv2 are true per RFC 4306? ...
Question 182: On which Cisco platform are dynamic virtual template interfa...
Question 183: By default, how does a Cisco ASA appliance process IP fragme...
Question 184: Which command will prevent a group policy from inheriting a ...
Question 185: A company needs to provide secure access to its remote workf...
Question 186: What are the three primary components of a GET VPN network? ...
Question 187: Which technology is FlexVPN based on?...
Question 188: Refer to the exhibit. Based on the partial configuration sho...
Question 189: Which two statements are true when designing a SSL VPN solut...
Question 190: Which PKI enrollment method allows the user to separate auth...
Question 191: Which command clears all crypto configuration from a Cisco A...
Question 192: (Exhibit) After implementing the IKEv2 tunnel, it was observ...
Question 193: Refer to the exhibit. The IKEv2 site-to-site VPN tunnel betw...
Question 194: Refer to the exhibit. (Exhibit) Which VPN solution does this...
Question 195: Refer to the exhibit. (Exhibit) A customer cannot establish ...
Question 196: Refer to the exhibit. (Exhibit) Which type of VPN implementa...
Question 197: Which three configuration parameters are mandatory for an IK...
Question 198: Authorization of a clientless SSL VPN defines the actions th...
Question 199: Which feature do you include in a highly available system to...
Question 200: Refer to the exhibit. (Exhibit) Which type of VPN is being c...
Question 201: Scenario Your organization has just implemented a Cisco AnyC...
Question 202: Which command can be used to troubleshoot an IPv6 FlexVPN sp...
Question 203: Which two GDOI encryption keys are used within a GET VPN net...
Question 204: (Exhibit) If the IKEv2 tunnel were to establish successfully...
Question 205: Which command identifies an AnyConnect profile that was uplo...
Question 206: Which benefit of FlexVPN is not offered by DMVPN using IKEv1...
Question 207: Refer to the exhibit. (Exhibit) Which technology is represen...
Question 208: What is the Cisco recommended TCP maximum segment on a DMVPN...
Question 209: A network engineer must configure a new VPN tunnel utilizing...
Question 210: You are troubleshooting a DMVPN NHRP registration failure. W...
Question 211: (Exhibit) Refer to the exhibit. VPN load balancing provides ...
Question 212: Refer to the exhibit. (Exhibit) The network administrator is...
Question 213: Which option is one component of a Public Key Infrastructure...
Question 214: You are troubleshooting a site-to-site VPN issue where the t...
Question 215: Which option lists the main tasks in the correct order to co...
Question 216: Which statement describes a prerequisite for single-sign-on ...
Question 217: Refer to the exhibit. (Exhibit) After the configuration is p...
Question 218: Which Cisco adaptive security appliance command can be used ...
Question 219: Which algorithm is replaced by elliptic curve cryptography i...
Question 220: Which three configurations are required for both IPsec VTI a...
Question 221: Which two qualify as Next Generation Encryption integrity al...
Question 222: Which two features are required when configuring a DMVPN net...
Question 223: The Cisco AnyConnect client fails to connect via IKEv2 but w...
Question 224: Which two statements about the running configuration of the ...
Question 225: Which two troubleshooting steps should be taken when Cisco A...
Question 226: A user with IP address 10.10.10.10 is unable to access a HTT...
Question 227: As network consultant, you are asked to suggest a VPN techno...
Question 228: An administrator received a report that a user cannot connec...
Question 229: Which three settings are required for crypto map configurati...
Question 230: Which command enables IOS SSL VPN Smart Tunnel support for P...
Question 231: Which Cisco firewall platform supports Cisco NGE?...
Question 232: Which of these is true regarding tunnel configuration when d...
Question 233: Which Cisco IOS VPN feature simplifies IPsec VPN configurati...
Question 234: Refer to the exhibit. (Exhibit) Which two statements about t...
Question 235: When troubleshooting established clientless SSL VPN issues, ...
Question 236: Which protocols does the Cisco AnyConnect client use to buil...
Question 237: Which configuration construct must be used in a FlexVPN tunn...
Question 238: What is the default topology type for a GET VPN?...
Question 239: When you are configuring a DMVPN network, which tunnel mode ...
Question 240: After completing a site-to-site VPN setup between two router...
Question 241: Which group-policy subcommand installs the Diagnostic AnyCon...
Question 242: Which three changes must be made to migrate from DMVPN Phase...
Question 243: A user is trying to connect to a Cisco IOS device using clie...
Question 244: A company has decided to migrate an existing IKEv1 VPN tunne...
Question 245: Which option is a required element of Secure Device Provisio...
Question 246: Scenario Your organization has just implemented a Cisco AnyC...
Question 247: Which two statements comparing ECC and RSA are true? (Choose...
Question 248: Which Cisco ASA configuration is used to configure the TCP i...
Question 249: You are troubleshooting a site-to-site VPN issue where the t...
Question 250: Which cryptographic algorithms are approved to protect Top S...
Question 251: Which technology can provide high availability for an SSL VP...
Question 252: When implementing GET VPN, which of these is a characteristi...
Question 253: Which three actions can be applied to a traffic class within...
Question 254: Which encryption and authentication algorithms does Cisco re...