<< Prev Question Next Question >>

Question 143/215

A custom desktop application needs to access an internal server. An administrator is tasked with
configuring the company's SSL VPN gateway to allow remote users to work. Which two technologies
would accommodate the company's requirement? (Choose two).

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (215q)
Question 1: You have been using pre-shared keys for IKE authentication o...
Question 2: Refer to the exhibit. (Exhibit) An administrator had the abo...
Question 3: Refer to the exhibit. (Exhibit) An administrator is adding I...
Question 4: An engineer notices that while an employee is connected remo...
Question 5: An engineer is configuring an IKEv1 VPN tunnel. Which two Di...
Question 6: Which two NHRP functions are specific to DMVPN Phase 3 imple...
Question 7: Which cryptographic algorithms are approved to protect Top S...
Question 8: Refer to the exhibit. (Exhibit) A junior network engineer co...
Question 9: Which two examples of transform sets are contained in the IK...
Question 10: Which technology can you implement to reduce latency issues ...
Question 11: An engineer is configuring SSL VPN to provide access to a co...
Question 12: Which option is an advantage of using elliptic curve cryptog...
Question 13: (Exhibit) Refer to the exhibit. An engineer is troubleshooti...
Question 14: Which technology can provide high availability for an SSL VP...
Question 15: (Exhibit) Refer to the exhibit. All internal clients behind ...
Question 16: Refer to the exhibit. (Exhibit) Which two statements about t...
Question 17: Refer to the exhibit. (Exhibit) A new NOC engineer, while vi...
Question 18: What are two benefits of SSL VPN versus IPsec VPN when consi...
Question 19: Your corporate finance department purchased a new non-web-ba...
Question 20: When using clientless SSL VPN, you might not want some appli...
Question 21: Which two statements describe effects of the DoNothing optio...
Question 22: Refer to the exhibit. (Exhibit) After the configuration is p...
Question 23: Which option must be enabled to allow an SSLVPN which is con...
Question 24: Which two statements about the Cisco ASA Clientless SSL VPN ...
Question 25: Refer to the exhibit. (Exhibit) While configuring a site-to-...
Question 26: A company has decided to migrate an existing IKEv1 VPN tunne...
Question 27: Mobile work force clients are using Cisco AnyConnect for rem...
Question 28: A company has acquired a competitor whose network infrastruc...
Question 29: Which benefit of FlexVPN is not offered by DMVPN using IKEv1...
Question 30: Which equation describes an elliptic curve?...
Question 31: Which feature do you include in a highly available system to...
Question 32: An engineer is configuring an IPsec VPN with IKEv2. Which th...
Question 33: Refer to the exhibit. An engineer has configured two new VPN...
Question 34: An internet-based VPN solution is being considered to replac...
Question 35: Which option describes the purpose of the shared argument in...
Question 36: Which NGE IKE Diffie-Hellman group identifier has the strong...
Question 37: Refer to the exhibit. (Exhibit) Which type of VPN implementa...
Question 38: A company has a Flex VPN solution for remote access and one ...
Question 39: (Exhibit) When a tunnel is initiated by the headquarter ASA,...
Question 40: Which adaptive security appliance command can be used to see...
Question 41: An administrator desires that when work laptops are not conn...
Question 42: In a spoke-to-spoke DMVPN topology, which type of interface ...
Question 43: Which are two main use cases for Clientless SSL VPN? (Choose...
Question 44: Which Cisco adaptive security appliance command can be used ...
Question 45: An engineer is configuring SSL VPN for remote access. A real...
Question 46: A network engineer is troubleshooting a VPN tunnel configure...
Question 47: Refer to the exhibit. (Exhibit) Which statement about the gi...
Question 48: Which two technologies are considered to be Suite B cryptogr...
Question 49: When attempting to tunnel FTP traffic through a stateful fir...
Question 50: An engineer has deployed Cisco IOS crypto-map based VPN and ...
Question 51: Which statement regarding GET VPN is true?...
Question 52: A customer requests a VPN solution to support multicast traf...
Question 53: In the Diffie-Hellman protocol, which type of key is the sha...
Question 54: Which two statements about the running configuration of the ...
Question 55: Scenario Your organization has just implemented a Cisco AnyC...
Question 56: Refer to the exhibit. (Exhibit) What technology does the giv...
Question 57: Regarding licensing, which option will allow IKEv2 connectio...
Question 58: Which IKEv2 feature minimizes the configuration of a FlexVPN...
Question 59: Refer to the exhibit. (Exhibit) Which VPN solution does this...
Question 60: Which two cryptographic technologies are recommended for use...
Question 61: Which command clears all crypto configuration from a Cisco A...
Question 62: Which option is a required element of Secure Device Provisio...
Question 63: An engineer has integrated a new DMVPN to link remote office...
Question 64: Which two Cisco ASA licensing features are correct with Cisc...
Question 65: In DMVPN phase 2, which two EIGRP features need to be disabl...
Question 66: As network consultant, you are asked to suggest a VPN techno...
Question 67: Which PKI enrollment method allows the user to separate auth...
Question 68: Which two changes must be made to migrate from DMVPN Phase 2...
Question 69: Which option is an example of an asymmetric algorithm?...
Question 70: When you configure IPsec VPN High Availability Enhancements,...
Question 71: Which technology supports tunnel interfaces while remaining ...
Question 72: Refer to the exhibit. (Exhibit) The "level_2" digital certif...
Question 73: From the CLI of a Cisco ASA 5520, which command shows specif...
Question 74: Which Cisco ASA platform should be selected if the requireme...
Question 75: Refer to the exhibit. (Exhibit) Which technology is represen...
Question 76: Which Cisco IOS feature provides secure, on-demand meshed co...
Question 77: Which three parameters are specified in the isakmp (IKEv1) p...
Question 78: As network security architect, you must implement secure VPN...
Question 79: Which interface is managed by the VPN Access Interface field...
Question 80: A rogue static route is installed in the routing table of a ...
Question 81: An engineer wants to ensure that employees cannot access cor...
Question 82: After adding a remote-access IPsec tunnel via the VPN wizard...
Question 83: Which three remote access VPN methods in an ASA appliance pr...
Question 84: Which two components are required for a Cisco IOS-based PKI ...
Question 85: Refer to the exhibit. (Exhibit) You are configuring a laptop...
Question 86: A Cisco AnyConnect VPN user receives this message every 30 m...
Question 87: Refer to the exhibit. (Exhibit) Which authentication method ...
Question 88: Refer to the exhibit. (Exhibit) You executed the show crypto...
Question 89: Which statement describes a prerequisite for single-sign-on ...
Question 90: Which protocol does DTLS use for its transport?...
Question 91: In FlexVPN, what command can an administrator use to create ...
Question 92: Which command enables IOS SSL VPN Smart Tunnel support for P...
Question 93: Which two options are benefits of AES compared to 3DES? (Cho...
Question 94: An IOS SSL VPN is configured to forward TCP ports. A remote ...
Question 95: Refer to the exhibit. Based on the partial configuration sho...
Question 96: Which cryptographic algorithm is used for data integrity?...
Question 97: Refer to the exhibit. (Exhibit) The user "contractor" inheri...
Question 98: A client has asked an engineer to assist in installing and u...
Question 99: An engineer is configuring IPsec VPN and wants to choose an ...
Question 100: Which two components are necessary for configuring spoke-to-...
Question 101: Which of the following could be used to configure remote acc...
Question 102: A user with IP address 10.10.10.10 is unable to access a HTT...
Question 103: In a FlexVPN deployment, the spokes are successfully connect...
Question 104: Refer to the exhibit. (Exhibit) Which VPN solution does this...
Question 105: Which two statements about the Internet Key Exchange version...
Question 106: In a GET VPN solution, which two ways can the key server dis...
Question 107: Which technology does a multipoint GRE interface require to ...
Question 108: Which option describes what address preservation with IPsec ...
Question 109: Which two are features of GETVPN but not DMVPN and FlexVPN? ...
Question 110: Which transform set is contained in the IKEv2 default propos...
Question 111: Which technology can rate-limit the number of tunnels on a D...
Question 112: Which option is the main difference between GET VPN and DMVP...
Question 113: Which three types of SSO functionality are available on the ...
Question 114: Refer to the exhibit. (Exhibit) An IPsec peer is exchanging ...
Question 115: Which type of communication in a FlexVPN implementation uses...
Question 116: A Cisco IOS SSL VPN gateway is configured to operate in clie...
Question 117: Which Cisco ASDM option configures WebVPN access on a Cisco ...
Question 118: Which statement regarding hashing is correct?...
Question 119: Which two options are purposes of the key server in Cisco IO...
Question 120: Which two operational advantages does GetVPN offer over site...
Question 121: Which command can be used to troubleshoot an IPv6 FlexVPN sp...
Question 122: Refer to the exhibit. (Exhibit) The ABC Corporation is chang...
Question 123: Which protocol must be enabled on the inside interface to us...
Question 124: Which VPN feature allows remote access clients to print docu...
Question 125: Which two troubleshooting steps should be taken when Cisco A...
Question 126: Which two parameters are configured within an IKEv2 proposal...
Question 127: Which is used by GETVPN, FlexVPN and DMVPN?...
Question 128: (Exhibit) Refer to the exhibit. An engineer must implement D...
Question 129: While attempting to establish a site-to-site VPN, the engine...
Question 130: What is the default storage location of user-level bookmarks...
Question 131: Where do you configure AnyConnect certificate-based authenti...
Question 132: Which configuration construct must be used in a FlexVPN tunn...
Question 133: A company wants to validate hosts before allowing them on th...
Question 134: Refer to the exhibit. (Exhibit) Which exchange does this deb...
Question 135: Refer to the exhibit. (Exhibit) A NOC engineer needs to tune...
Question 136: Which two qualify as Next Generation Encryption integrity al...
Question 137: Where must an engineer configure a preshared key for site-to...
Question 138: When you are configuring a DMVPN network, which tunnel mode ...
Question 139: Which two statements regarding IKEv2 are true per RFC 4306? ...
Question 140: Which three types of web resources or protocols are enabled ...
Question 141: Which two statements comparing ECC and RSA are true? (Choose...
Question 142: With Cisco ASA active/standby failover, by default, how many...
Question 143: A custom desktop application needs to access an internal ser...
Question 144: Which VPN technology is preferred to reduce latency and prov...
Question 145: A network administrator is configuring AES encryption for th...
Question 146: Which command will prevent a group policy from inheriting a ...
Question 147: (Exhibit) Refer to the exhibit. Which statement is accurate ...
Question 148: Refer to the exhibit. (Exhibit) A customer cannot establish ...
Question 149: (Exhibit) Refer to the exhibit. VPN load balancing provides ...
Question 150: Which Cisco IOS VPN feature simplifies IPsec VPN configurati...
Question 151: Which command identifies an AnyConnect profile that was uplo...
Question 152: Refer to the exhibit. (Exhibit) While troubleshooting on a r...
Question 153: Refer to the exhibit. (Exhibit) Which VPN solution does this...
Question 154: When implementing GET VPN, which of these is a characteristi...
Question 155: Which group-policy subcommand installs the Diagnostic AnyCon...
Question 156: An engineer is troubleshooting an IPsec site-to-site tunnel ...
Question 157: When initiating a new SSL or TLS session, the client receive...
Question 158: Which two IKEv1 policy options must match on each peer when ...
Question 159: Which statement about the local and remote methods in an IKE...
Question 160: Which three parameters must match on all routers in a DMVPN ...
Question 161: Which feature is a benefit of Dynamic Multipoint VPN?...
Question 162: Which application does the Application Access feature of Cli...
Question 163: Which two parameters help to map a VPN session to a tunnel g...
Question 164: Which two statements are true when designing a SSL VPN solut...
Question 165: In FlexVPN, what is the role of a NHRP resolution request?...
Question 166: Scenario Your organization has just implemented a Cisco AnyC...
Question 167: An engineer is troubleshooting network issues and wants to c...
Question 168: (Exhibit) Refer to the exhibit. Which result of this command...
Question 169: A temporary worker must use clientless SSL VPN with an SSH p...
Question 170: An administrator received a report that a user cannot connec...
Question 171: Which command clears all Cisco AnyConnect VPN sessions?...
Question 172: An engineer must set up a site-to-site VPN implementation wi...
Question 173: Which algorithm is replaced by elliptic curve cryptography i...
Question 174: (Exhibit) Refer to the exhibit. Which result of this command...
Question 175: Which way to send OSPF routing updates over a site-to-site I...
Question 176: Which option is one component of a Public Key Infrastructure...
Question 177: Which command simplifies the task of converting an SSL VPN t...
Question 178: What does DART stand for?
Question 179: Using the Next Generation Encryption technologies, which is ...
Question 180: An engineer has successfully established a phase 1 tunnel, b...
Question 181: Which two command are included in the command show dmvpn det...
Question 182: Refer to the exhibit. (Exhibit) Which technology does this c...
Question 183: What does NHRP stand for?
Question 184: An engineer is configuring a site-to-site VPN tunnel. Which ...
Question 185: What are two features of Cisco GET VPN? (Choose two.)...
Question 186: Refer to the exhibit. (Exhibit) A NOC engineer is in the pro...
Question 187: Which Cisco ASA configuration is used to configure the TCP i...
Question 188: Which VPN type can be used to provide secure remote access f...
Question 189: Refer to the exhibit. An engineer is troubleshooting this co...
Question 190: Scenario Your organization has just implemented a Cisco AnyC...
Question 191: When you troubleshoot Cisco AnyConnect, which step does Cisc...
Question 192: Which command does a network engineer type on both spoke rou...
Question 193: Which protocol supports high availability in a Cisco IOS SSL...
Question 194: A user is trying to connect to a Cisco IOS device using clie...
Question 195: By default, how does a Cisco ASA appliance process IP fragme...
Question 196: (Exhibit) After implementing the IKEv2 tunnel, it was observ...
Question 197: Which statement about CRL configuration is correct?...
Question 198: In a new DMVPN deployment, phase 1 completes successfully. H...
Question 199: A customer requires all traffic to go through a VPN. However...
Question 200: Which alogrithm is an example of asymmetric encryption?...
Question 201: Refer to the exhibit. (Exhibit) What is the purpose of the g...
Question 202: Which option is most effective at preventing a remote access...
Question 203: You have deployed new Cisco AnyConnect start before logon mo...
Question 204: Which technology must be installed on the client computer to...
Question 205: A private wan connection is suspected of intermittently corr...
Question 206: (Exhibit) Refer to the exhibit. Users at each end of this VP...
Question 207: Refer to the exhibit. What is the problem with the IKEv2 sit...
Question 208: A network engineer is troubleshooting a site-to-site VPN tun...
Question 209: Which functionality is provided by L2TPv3 over FlexVPN?...
Question 210: Instructions Enter CLI commands on the ASA and Branch router...
Question 211: Which two are characteristics of GETVPN? (Choose two.)...
Question 212: A user is experiencing issues connecting to a Cisco AnyConne...
Question 213: What must be enabled in the web browser of the client comput...
Question 214: What is the default topology type for a GET VPN?...
Question 215: Which command configures IKEv2 symmetric identity authentica...