Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Implementing Secure Solutions with Virtual Private Networks (SVPN) Question and Answers

Implementing Secure Solutions with Virtual Private Networks (SVPN)

Last Update May 4, 2024
Total Questions : 175

We are offering FREE 300-730 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-730 free exam questions and then go for complete pool of Implementing Secure Solutions with Virtual Private Networks (SVPN) test questions that will help you more.

300-730 pdf

300-730 PDF

$38.5  $109.99
300-730 Engine

300-730 Testing Engine

$45.5  $129.99
300-730 PDF + Engine

300-730 PDF + Testing Engine

$59.5  $169.99
Questions 1

A second set of traffic selectors is negotiated between two peers using IKEv2. Which IKEv2 packet will contain details of the exchange?

Options:

A.  

IKEv2 IKE_SA_INIT

B.  

IKEv2 INFORMATIONAL

C.  

IKEv2 CREATE_CHILD_SA

D.  

IKEv2 IKE_AUTH

Discussion 0
Questions 2

Which two changes must be made in order to migrate from DMVPN Phase 2 to Phase 3 when EIGRP is configured? (Choose two.)

Options:

A.  

Add NHRP shortcuts on the hub.

B.  

Add NHRP redirects on the spoke.

C.  

Disable EIGRP next-hop-self on the hub.

D.  

Enable EIGRP next-hop-self on the hub.

E.  

Add NHRP redirects on the hub.

Discussion 0
Questions 3

Drag and drop the correct commands from the night onto the blanks within the code on the left to implement a design that allow for dynamic spoke-to-spoke communication. Not all comments are used.

Options:

Discussion 0
Questions 4

Which method dynamically installs the network routes for remote tunnel endpoints?

Options:

A.  

policy-based routing

B.  

CEF

C.  

reverse route injection

D.  

route filtering

Discussion 0
Questions 5

Which statement about GETVPN is true?

Options:

A.  

The configuration that defines which traffic to encrypt originates from the key server.

B.  

TEK rekeys can be load-balanced between two key servers operating in COOP.

C.  

The pseudotime that is used for replay checking is synchronized via NTP.

D.  

Group members must acknowledge all KEK and TEK rekeys, regardless of configuration.

Discussion 0
Questions 6

Refer to the exhibit.

Which two tunnel types produce the show crypto ipsec sa output seen in the exhibit? (Choose two.)

Options:

A.  

crypto map

B.  

DMVPN

C.  

GRE

D.  

FlexVPN

E.  

VTI

Discussion 0
Questions 7

Refer to the exhibit.

A customer cannot establish an IKEv2 site-to-site VPN tunnel between two Cisco ASA devices. Based on the syslog message, which action brings up the VPN tunnel?

Options:

A.  

Reduce the maximum SA limit on the local Cisco AS

A.  

B.  

Increase the maximum in-negotiation SA limit on the local Cisco ASA.

C.  

Remove the maximum SA limit on the remote Cisco ASA.

D.  

Correct the crypto access list on both Cisco ASA devices.

Discussion 0
Questions 8

On a FlexVPN hub-and-spoke topology where spoke-to-spoke tunnels are not allowed, which command is needed for the hub to be able to terminate FlexVPN tunnels?

Options:

A.  

interface virtual-access

B.  

ip nhrp redirect

C.  

interface tunnel

D.  

interface virtual-template

Discussion 0
Questions 9

Which two remote access VPN solutions support SSL? (Choose two.)

Options:

A.  

FlexVPN

B.  

clientless

C.  

EZVPN

D.  

L2TP

E.  

Cisco AnyConnect

Discussion 0
Questions 10

Which parameter is initially used to elect the primary key server from a group of key servers?

Options:

A.  

code version

B.  

highest IP address

C.  

highest-priority value

D.  

lowest IP address

Discussion 0
Questions 11

Which parameter must match on all routers in a DMVPN Phase 3 cloud?

Options:

A.  

GRE tunnel key

B.  

NHRP network ID

C.  

tunnel VRF

D.  

EIGRP split-horizon setting

Discussion 0
Questions 12

What are two purposes of the key server in Cisco IOS GETVPN? (Choose two.)

Options:

A.  

to download encryption keys

B.  

to maintain encryption policies

C.  

to distribute routing information

D.  

to encrypt data traffic

E.  

to authenticate group members

Discussion 0
Questions 13

Which two parameters help to map a VPN session to a tunnel group without using the tunnel-group list? (Choose two.)

Options:

A.  

group-alias

B.  

certificate map

C.  

optimal gateway selection

D.  

group-url

E.  

AnyConnect client version

Discussion 0
Questions 14

Which feature allows the ASA to handle nonstandard applications and web resources so that they display correctly over a clientless SSL VPN connection?

Options:

A.  

single sign-on

B.  

Smart Tunnel

C.  

WebType ACL

D.  

plug-ins

Discussion 0
Questions 15

Which requirement is needed to use local authentication for Cisco AnyConnect Secure Mobility Clients that connect to a FlexVPN server?

Options:

A.  

use of certificates instead of username and password

B.  

EAP-AnyConnect

C.  

EAP query-identity

D.  

AnyConnect profile

Discussion 0
Questions 16

Refer to the exhibit.

Which two commands under the tunnel-group webvpn-attributes result in a Cisco AnyConnect user receiving the AnyConnect prompt in the exhibit? (Choose two.)

Options:

A.  

group-url https://172.16.31.10/General enable

B.  

group-policy General internal

C.  

authentication aaa

D.  

authentication certificate

E.  

group-alias General enable

Discussion 0
Questions 17

Cisco AnyConnect Secure Mobility Client has been configured to use IKEv2 for one group of users and SSL for another group. When the administrator configures a new AnyConnect release on the Cisco ASA, the IKEv2 users cannot download it automatically when they connect. What might be the problem?

Options:

A.  

The XML profile is not configured correctly for the affected users.

B.  

The new client image does not use the same major release as the current one.

C.  

Client services are not enabled.

D.  

Client software updates are not supported with IKEv2.

Discussion 0
Questions 18

Which command automatically initiates a smart tunnel when a user logs in to the WebVPN portal page?

Options:

A.  

auto-upgrade

B.  

auto-connect

C.  

auto-start

D.  

auto-run

Discussion 0
Questions 19

Which configuration construct must be used in a FlexVPN tunnel?

Options:

A.  

EAP configuration

B.  

multipoint GRE tunnel interface

C.  

IKEv1 policy

D.  

IKEv2 profile

Discussion 0
Questions 20

An engineer is troubleshooting a new DMVPN setup on a Cisco IOS router. After the show crypto isakmp sa command is issued, a response is returned of "MM_NO_STATE." Why does this failure occur?

Options:

A.  

The ISAKMP policy priority values are invalid.

B.  

ESP traffic is being dropped.

C.  

The Phase 1 policy does not match on both devices.

D.  

Tunnel protection is not applied to the DMVPN tunnel.

Discussion 0
Questions 21

Refer to the exhibit.

An SSL client is connecting to an ASA headend. The session fails with the message “Connection attempt has timed out. Please verify Internet connectivity.” Based on how the packet is processed, which phase is causing the failure?

Options:

A.  

phase 9: rpf-check

B.  

phase 5: NAT

C.  

phase 4: ACCESS-LIST

D.  

phase 3: UN-NAT

Discussion 0
Questions 22

Refer to the exhibit.

Which value must be configured in the User Group field when the Cisco AnyConnect Profile is created to connect to an ASA headend with IPsec as the primary protocol?

Options:

A.  

address-pool

B.  

group-alias

C.  

group-policy

D.  

tunnel-group

Discussion 0
Questions 23

Refer to the exhibit.

The IKEv2 site-to-site VPN tunnel between two routers is down. Based on the debug output, which type of mismatch is the problem?

Options:

A.  

preshared key

B.  

peer identity

C.  

transform set

D.  

ikev2 proposal

Discussion 0
Questions 24

In a FlexVPN deployment, the spokes successfully connect to the hub, but spoke-to-spoke tunnels do not form. Which troubleshooting step solves the issue?

Options:

A.  

Verify the spoke configuration to check if the NHRP redirect is enabled.

B.  

Verify that the spoke receives redirect messages and sends resolution requests.

C.  

Verify the hub configuration to check if the NHRP shortcut is enabled.

D.  

Verify that the tunnel interface is contained within a VRF.

Discussion 0
Questions 25

Refer to the exhibit.

Client 1 cannot communicate with client 2. Both clients are using Cisco AnyConnect and have established a successful SSL VPN connection to the hub ASA. Which command on the ASA is missing?

Options:

A.  

dns-server value 10.1.1.2

B.  

same-security-traffic permit intra-interface

C.  

same-security-traffic permit inter-interface

D.  

dns-server value 10.1.1.3

Discussion 0
Questions 26

Refer to the exhibit.

Based on the debug output, which type of mismatch is preventing the VPN from coming up?

Options:

A.  

interesting traffic

B.  

lifetime

C.  

preshared key

D.  

PFS

Discussion 0
Questions 27

Refer to the exhibit.

What is a result of this configuration?

Options:

A.  

Spoke 1 fails the authentication because the authentication methods are incorrect.

B.  

Spoke 2 passes the authentication to the hub and successfully proceeds to phase 2.

C.  

Spoke 2 fails the authentication because the remote authentication method is incorrect.

D.  

Spoke 1 passes the authentication to the hub and successfully proceeds to phase 2.

Discussion 0
Questions 28

Refer to the exhibit.

The customer can establish a Cisco AnyConnect connection without using an XML profile. When the host "ikev2" is selected in the AnyConnect drop down, the connection fails. What is the cause of this issue?

Options:

A.  

The HostName is incorrect.

B.  

The IP address is incorrect.

C.  

Primary protocol should be SSL.

D.  

UserGroup must match connection profile.

Discussion 0
Questions 29

Refer to the exhibit.

Which type of mismatch is causing the problem with the IPsec VPN tunnel?

Options:

A.  

crypto access list

B.  

Phase 1 policy

C.  

transform set

D.  

preshared key

Discussion 0
Questions 30

Refer to the exhibit.

The DMVPN tunnel is dropping randomly and no tunnel protection is configured. Which spoke configuration mitigates tunnel drops?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 31

Which benefit of FlexVPN is a limitation of DMVPN using IKEv1?

Options:

A.  

GRE encapsulation allows for forwarding of non-IP traffic.

B.  

IKE implementation can install routes in routing table.

C.  

NHRP authentication provides enhanced security.

D.  

Dynamic routing protocols can be configured.

Discussion 0
Questions 32

Refer to the exhibit.

All internal clients behind the ASA are port address translated to the public outside interface that has an IP address of 3.3.3.3. Client 1 and client 2 have established successful SSL VPN connections to the ASA. What must be implemented so that "3.3.3.3" is returned from a browser search on the IP address?

Options:

A.  

Same-security-traffic permit inter-interface under Group Policy

B.  

Exclude Network List Below under Group Policy

C.  

Tunnel All Networks under Group Policy

D.  

Tunnel Network List Below under Group Policy

Discussion 0
Questions 33

Which feature of GETVPN is a limitation of DMVPN and FlexVPN?

Options:

A.  

sequence numbers that enable scalable replay checking

B.  

enabled use of ESP or AH

C.  

design for use over public or private WAN

D.  

no requirement for an overlay routing protocol

Discussion 0
Questions 34

Which two commands help determine why the NHRP registration process is not being completed even after the IPsec tunnel is up? (Choose two.)

Options:

A.  

show crypto isakmp sa

B.  

show ip traffic

C.  

show crypto ipsec sa

D.  

show ip nhrp traffic

E.  

show dmvpn detail

Discussion 0
Questions 35

Where is split tunneling defined for IKEv2 remote access clients on a Cisco router?

Options:

A.  

IKEv2 authorization policy

B.  

Group Policy

C.  

virtual template

D.  

webvpn context

Discussion 0
Questions 36

Which VPN solution uses TBAR?

Options:

A.  

GETVPN

B.  

VTI

C.  

DMVPN

D.  

Cisco AnyConnect

Discussion 0
Questions 37

Refer to the exhibit.

Cisco AnyConnect must be set up on a router to allow users to access internal servers 192.168.0.10 and 192.168.0.11. All other traffic should go out of the client's local NIC. Which command accomplishes this configuration?

Options:

A.  

svc split include 192.168.0.0 255.255.255.0

B.  

svc split exclude 192.168.0.0 255.255.255.0

C.  

svc split include acl CCNP

D.  

svc split exclude acl CCNP

Discussion 0
Questions 38

Which two statements about the Cisco ASA Clientless SSL VPN solution are true? (Choose two.)

Options:

A.  

When a client connects to the Cisco ASA WebVPN portal and tries to access HTTP resources through the URL bar, the client uses the local DNS to perform FQDN resolution.

B.  

The rewriter enable command under the global webvpn configuration enables the rewriter functionality because that feature is disabled by default.

C.  

A Cisco ASA can simultaneously allow Clientless SSL VPN sessions and AnyConnect client sessions.

D.  

When a client connects to the Cisco ASA WebVPN portal and tries to access HTTP resources through the URL bar, the ASA uses its configured DNS servers to perform FQDN resolution.

E.  

Clientless SSLVPN provides Layer 3 connectivity into the secured network.

Discussion 0
Questions 39

Refer to the exhibit.

An engineer is troubleshooting a new GRE over IPsec tunnel. The tunnel is established but the engineer cannot ping from spoke 1 to spoke 2. Which type of traffic is being blocked?

Options:

A.  

ESP packets from spoke2 to spoke1

B.  

ISAKMP packets from spoke2 to spoke1

C.  

ESP packets from spoke1 to spoke2

D.  

ISAKMP packets from spoke1 to spoke2

Discussion 0
Questions 40

Which command identifies a Cisco AnyConnect profile that was uploaded to the flash of an IOS router?

Options:

A.  

svc import profile SSL_profile flash:simos-profile.xml

B.  

anyconnect profile SSL_profile flash:simos-profile.xml

C.  

crypto vpn anyconnect profile SSL_profile flash:simos-profile.xml

D.  

webvpn import profile SSL_profile flash:simos-profile.xml

Discussion 0
Questions 41

Refer to the exhibit.

What is configured as a result of this command set?

Options:

A.  

FlexVPN client profile for IPv6

B.  

FlexVPN server to authorize groups by using an IPv6 external AAA

C.  

FlexVPN server for an IPv6 dVTI session

D.  

FlexVPN server to authenticate IPv6 peers by using EAP

Discussion 0