<< Prev Question Next Question >>

Question 21/95

What is the default topology type for a GET VPN?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (95q)
Question 1: Drag and drop the debug messages on the left onto the associ...
Question 2: While attempting to establish a site-to-site VPN, the engine...
Question 3: Which command will prevent a group policy from inheriting a ...
Question 4: Using the Next Generation Encryption technologies, which is ...
Question 5: Refer to the exhibit. (Exhibit) An engineer has configured t...
Question 6: Refer to the exhibit. (Exhibit) While troubleshooting a remo...
Question 7: What are two features of Cisco GET VPN? (Choose two.)...
Question 8: Which method dynamically advertises the network routes for r...
Question 9: Refer to the exhibit. (Exhibit) Which VPN solution does this...
Question 10: After completing a site-to-site VPN setup between two router...
Question 11: Where must an engineer configure a preshared key for site-to...
Question 12: You are designing a remote VPN solution that will use the Ci...
Question 13: Refer to the Exhibit: (Exhibit) An engineer must implement D...
Question 14: An engineer wants to ensure that Diffie-Helman keys are re-g...
Question 15: Which cryptographic algorithms are a part of the Cisco NGE s...
Question 16: Which two features are available in the Plus license for Cis...
Question 17: Which configuration construct must be used in a FlexVPN tunn...
Question 18: An engineer has configured Cisco AnyConnect VPN using IKEv2 ...
Question 19: Which technology can provide high availability for an SSL VP...
Question 20: Which option is a benefit of ECC as compared to public key c...
Question 21: What is the default topology type for a GET VPN?...
Question 22: Which description of how DTLS improves application performan...
Question 23: Refer to the exhibit. (Exhibit) Which exchange does this deb...
Question 24: (Exhibit) Refer to the exhibit. In this tunnel mode GRE mult...
Question 25: After adding a remote-access IPsec tunnel via the VPN wizard...
Question 26: Refer to the exhibit. (Exhibit) The "level_2" digital certif...
Question 27: Which VPN type can be used to provide secure remote access f...
Question 28: Authorization of a clientless SSL VPN defines the actions th...
Question 29: Which command configures IKEv2 symmetric identity authentica...
Question 30: As network security architect, you must implement secure VPN...
Question 31: Refer to the Exhibit: (Exhibit) A network security engineer ...
Question 32: A customer requires site-to-site VPNs to connect to third pa...
Question 33: Which access lists are used in a typical IPsec VPN configura...
Question 34: Where do you configure AnyConnect certificate-based authenti...
Question 35: In a new DMVPN deployment, phase 1 completes successfully. H...
Question 36: Which protocols does the Cisco AnyConnect client use to buil...
Question 37: Refer to the exhibit. (Exhibit) An IPsec peer is exchanging ...
Question 38: Refer to the exhibit. (Exhibit) You are configuring a laptop...
Question 39: Which statement describes a prerequisite for single-sign-on ...
Question 40: An engineer is configuring SSL VPN for remote access. A real...
Question 41: A company has decided to migrate an existing IKEv1 VPN tunne...
Question 42: You are troubleshooting a site-to-site VPN issue where the t...
Question 43: When you confrere an access list on the external interface o...
Question 44: Which algorithm does ISAKMP use to securely derive encryptio...
Question 45: (Exhibit) An engineer wants to ensure that employees cannot ...
Question 46: Which feature do you include in a highly available system to...
Question 47: Refer to the exhibit. (Exhibit) Which type of VPN implementa...
Question 48: An engineer is configuring a site-t-site VPM tunnel. Which t...
Question 49: Which statement is true when implementing a router with a dy...
Question 50: (Exhibit) After implementing the IKEv2 tunnel, it was observ...
Question 51: Refer to the exhibit. (Exhibit) An administrator had the abo...
Question 52: Which command clears all crypto configuration from a Cisco A...
Question 53: Which technology can you implement to reduce latency issues ...
Question 54: You have been using pre-shared keys for IKE authentication o...
Question 55: Refer to the exhibit. (Exhibit) Which type of VPN is being c...
Question 56: An administrator desires that when work laptops are not conn...
Question 57: Which is used by GETVPN, FlexVPN and DMVPN?...
Question 58: Within a PKI system, which option is a trusted entity?...
Question 59: Refer to the exhibit. (Exhibit) You are implementing DMVPN P...
Question 60: Which technology can rate-limit the number of tunnels on a D...
Question 61: In a FlexVPN deployment, the spokes are successfully connect...
Question 62: (Exhibit) Refer to the exhibit. Which statement is accurate ...
Question 63: Which Cisco ASDM option configures forwarding syslog message...
Question 64: Refer to the exhibit. (Exhibit) You have implemented an SSL ...
Question 65: An IOS SSL VPN is configured to forward TCP ports. A remote ...
Question 66: Refer to the exhibit. (Exhibit) An engineer is troubleshooti...
Question 67: Refer to the exhibit. (Exhibit) Which VPN solution does this...
Question 68: When attempting to tunnel FTP traffic through a stateful fir...
Question 69: Which of the following could be used to configure remote acc...
Question 70: Drag and drop the descriptions from the left onto the correc...
Question 71: Regarding licensing, which option will allow IKEv2 connectio...
Question 72: Which application does the Application Access feature of Cli...
Question 73: From the CLI of a Cisco ASA 5520, which command shows specif...
Question 74: Which NGE IKE Diffie-Hellman group identifier has the strong...
Question 75: Which two technologies are considered to be Suite B cryptogr...
Question 76: To change the title panel on the logon page of the Cisco IOS...
Question 77: Which two options are purposes of the key server in Cisco IO...
Question 78: Which two statements about Internet Key Exchange version 1 a...
Question 79: Your corporate finance department purchased a new non-web-ba...
Question 80: Refer to the exhibit. (Exhibit) A junior network engineer co...
Question 81: Which equation describes an elliptic curve?...
Question 82: An administrator wishes to limit the networks reachable over...
Question 83: A network is configured to allow clientless access to resour...
Question 84: Scenario: You are the senior network security administrator ...
Question 85: Refer to the Exhibit: (Exhibit) Users at each end of this VP...
Question 86: Which two changes must be made to migrate from DMVPN Phase 2...
Question 87: You are configuring a Cisco ASA for Clientless SSL VPN. Whic...
Question 88: Which command simplifies the task of converting an SSL VPN t...
Question 89: Which encryption algorithm does Cisco recommend that you avo...
Question 90: A network engineer must configure a now VPN tunnel Utilizing...
Question 91: An engineer is configuring an IKEv1 VPN tunnel. Which two Di...
Question 92: Which way to send OSPF routing updates over a site-to-site I...
Question 93: A company has acquired a competitor whose network infrastruc...
Question 94: A user is experiencing issues connecting to a Cisco AnyConne...
Question 95: Which Cisco firewall platform supports Cisco NGE?...