<< Prev Question Next Question >>

Question 56/95

An administrator desires that when work laptops are not connected to the corporate network, they should automatically initiate an AnyConnect VPN tunnel back to headquarters. Where does the administrator configure this?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (95q)
Question 1: Drag and drop the debug messages on the left onto the associ...
Question 2: While attempting to establish a site-to-site VPN, the engine...
Question 3: Which command will prevent a group policy from inheriting a ...
Question 4: Using the Next Generation Encryption technologies, which is ...
Question 5: Refer to the exhibit. (Exhibit) An engineer has configured t...
Question 6: Refer to the exhibit. (Exhibit) While troubleshooting a remo...
Question 7: What are two features of Cisco GET VPN? (Choose two.)...
Question 8: Which method dynamically advertises the network routes for r...
Question 9: Refer to the exhibit. (Exhibit) Which VPN solution does this...
Question 10: After completing a site-to-site VPN setup between two router...
Question 11: Where must an engineer configure a preshared key for site-to...
Question 12: You are designing a remote VPN solution that will use the Ci...
Question 13: Refer to the Exhibit: (Exhibit) An engineer must implement D...
Question 14: An engineer wants to ensure that Diffie-Helman keys are re-g...
Question 15: Which cryptographic algorithms are a part of the Cisco NGE s...
Question 16: Which two features are available in the Plus license for Cis...
Question 17: Which configuration construct must be used in a FlexVPN tunn...
Question 18: An engineer has configured Cisco AnyConnect VPN using IKEv2 ...
Question 19: Which technology can provide high availability for an SSL VP...
Question 20: Which option is a benefit of ECC as compared to public key c...
Question 21: What is the default topology type for a GET VPN?...
Question 22: Which description of how DTLS improves application performan...
Question 23: Refer to the exhibit. (Exhibit) Which exchange does this deb...
Question 24: (Exhibit) Refer to the exhibit. In this tunnel mode GRE mult...
Question 25: After adding a remote-access IPsec tunnel via the VPN wizard...
Question 26: Refer to the exhibit. (Exhibit) The "level_2" digital certif...
Question 27: Which VPN type can be used to provide secure remote access f...
Question 28: Authorization of a clientless SSL VPN defines the actions th...
Question 29: Which command configures IKEv2 symmetric identity authentica...
Question 30: As network security architect, you must implement secure VPN...
Question 31: Refer to the Exhibit: (Exhibit) A network security engineer ...
Question 32: A customer requires site-to-site VPNs to connect to third pa...
Question 33: Which access lists are used in a typical IPsec VPN configura...
Question 34: Where do you configure AnyConnect certificate-based authenti...
Question 35: In a new DMVPN deployment, phase 1 completes successfully. H...
Question 36: Which protocols does the Cisco AnyConnect client use to buil...
Question 37: Refer to the exhibit. (Exhibit) An IPsec peer is exchanging ...
Question 38: Refer to the exhibit. (Exhibit) You are configuring a laptop...
Question 39: Which statement describes a prerequisite for single-sign-on ...
Question 40: An engineer is configuring SSL VPN for remote access. A real...
Question 41: A company has decided to migrate an existing IKEv1 VPN tunne...
Question 42: You are troubleshooting a site-to-site VPN issue where the t...
Question 43: When you confrere an access list on the external interface o...
Question 44: Which algorithm does ISAKMP use to securely derive encryptio...
Question 45: (Exhibit) An engineer wants to ensure that employees cannot ...
Question 46: Which feature do you include in a highly available system to...
Question 47: Refer to the exhibit. (Exhibit) Which type of VPN implementa...
Question 48: An engineer is configuring a site-t-site VPM tunnel. Which t...
Question 49: Which statement is true when implementing a router with a dy...
Question 50: (Exhibit) After implementing the IKEv2 tunnel, it was observ...
Question 51: Refer to the exhibit. (Exhibit) An administrator had the abo...
Question 52: Which command clears all crypto configuration from a Cisco A...
Question 53: Which technology can you implement to reduce latency issues ...
Question 54: You have been using pre-shared keys for IKE authentication o...
Question 55: Refer to the exhibit. (Exhibit) Which type of VPN is being c...
Question 56: An administrator desires that when work laptops are not conn...
Question 57: Which is used by GETVPN, FlexVPN and DMVPN?...
Question 58: Within a PKI system, which option is a trusted entity?...
Question 59: Refer to the exhibit. (Exhibit) You are implementing DMVPN P...
Question 60: Which technology can rate-limit the number of tunnels on a D...
Question 61: In a FlexVPN deployment, the spokes are successfully connect...
Question 62: (Exhibit) Refer to the exhibit. Which statement is accurate ...
Question 63: Which Cisco ASDM option configures forwarding syslog message...
Question 64: Refer to the exhibit. (Exhibit) You have implemented an SSL ...
Question 65: An IOS SSL VPN is configured to forward TCP ports. A remote ...
Question 66: Refer to the exhibit. (Exhibit) An engineer is troubleshooti...
Question 67: Refer to the exhibit. (Exhibit) Which VPN solution does this...
Question 68: When attempting to tunnel FTP traffic through a stateful fir...
Question 69: Which of the following could be used to configure remote acc...
Question 70: Drag and drop the descriptions from the left onto the correc...
Question 71: Regarding licensing, which option will allow IKEv2 connectio...
Question 72: Which application does the Application Access feature of Cli...
Question 73: From the CLI of a Cisco ASA 5520, which command shows specif...
Question 74: Which NGE IKE Diffie-Hellman group identifier has the strong...
Question 75: Which two technologies are considered to be Suite B cryptogr...
Question 76: To change the title panel on the logon page of the Cisco IOS...
Question 77: Which two options are purposes of the key server in Cisco IO...
Question 78: Which two statements about Internet Key Exchange version 1 a...
Question 79: Your corporate finance department purchased a new non-web-ba...
Question 80: Refer to the exhibit. (Exhibit) A junior network engineer co...
Question 81: Which equation describes an elliptic curve?...
Question 82: An administrator wishes to limit the networks reachable over...
Question 83: A network is configured to allow clientless access to resour...
Question 84: Scenario: You are the senior network security administrator ...
Question 85: Refer to the Exhibit: (Exhibit) Users at each end of this VP...
Question 86: Which two changes must be made to migrate from DMVPN Phase 2...
Question 87: You are configuring a Cisco ASA for Clientless SSL VPN. Whic...
Question 88: Which command simplifies the task of converting an SSL VPN t...
Question 89: Which encryption algorithm does Cisco recommend that you avo...
Question 90: A network engineer must configure a now VPN tunnel Utilizing...
Question 91: An engineer is configuring an IKEv1 VPN tunnel. Which two Di...
Question 92: Which way to send OSPF routing updates over a site-to-site I...
Question 93: A company has acquired a competitor whose network infrastruc...
Question 94: A user is experiencing issues connecting to a Cisco AnyConne...
Question 95: Which Cisco firewall platform supports Cisco NGE?...