Month End Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Cisco 300-730 Dumps

Page: 1 / 5
Total 146 questions

Implementing Secure Solutions with Virtual Private Networks (SVPN) Questions and Answers

Question 1

Which redundancy protocol must be implemented for IPsec stateless failover to work?

Options:

A.

SSO

B.

GLBP

C.

HSRP

D.

VRRP

Question 2

Cisco AnyConnect clients need to transfer large files over the VPN sessions. Which protocol provides the best throughput?

Options:

A.

SSL/TLS

B.

L2TP

C.

DTLS

D.

IPsec IKEv1

Question 3

Where is split tunneling defined for IKEv2 remote access clients on a Cisco router?

Options:

A.

IKEv2 authorization policy

B.

Group Policy

C.

virtual template

D.

webvpn context

Question 4

What uses an Elliptic Curve key exchange algorithm?

Options:

A.

ECDSA

B.

ECDHE

C.

AES-GCM

D.

SHA

Question 5

Which technology works with IPsec stateful failover?

Options:

A.

GLBR

B.

HSRP

C.

GRE

D.

VRRP

Question 6

Refer to the exhibit.

The DMVPN tunnel is dropping randomly and no tunnel protection is configured. Which spoke configuration mitigates tunnel drops?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 7

Which statement about GETVPN is true?

Options:

A.

The configuration that defines which traffic to encrypt originates from the key server.

B.

TEK rekeys can be load-balanced between two key servers operating in COOP.

C.

The pseudotime that is used for replay checking is synchronized via NTP.

D.

Group members must acknowledge all KEK and TEK rekeys, regardless of configuration.

Question 8

Which method dynamically installs the network routes for remote tunnel endpoints?

Options:

A.

policy-based routing

B.

CEF

C.

reverse route injection

D.

route filtering

Question 9

Which two parameters help to map a VPN session to a tunnel group without using the tunnel-group list? (Choose two.)

Options:

A.

group-alias

B.

certificate map

C.

optimal gateway selection

D.

group-url

E.

AnyConnect client version

Question 10

Refer to the exhibit.

Which two tunnel types produce the show crypto ipsec sa output seen in the exhibit? (Choose two.)

Options:

A.

crypto map

B.

DMVPN

C.

GRE

D.

FlexVPN

E.

VTI

Question 11

Refer to the exhibit.

An SSL client is connecting to an ASA headend. The session fails with the message “Connection attempt has timed out. Please verify Internet connectivity.” Based on how the packet is processed, which phase is causing the failure?

Options:

A.

phase 9: rpf-check

B.

phase 5: NAT

C.

phase 4: ACCESS-LIST

D.

phase 3: UN-NAT

Question 12

Refer to the exhibit.

Client 1 cannot communicate with client 2. Both clients are using Cisco AnyConnect and have established a successful SSL VPN connection to the hub ASA. Which command on the ASA is missing?

Options:

A.

dns-server value 10.1.1.2

B.

same-security-traffic permit intra-interface

C.

same-security-traffic permit inter-interface

D.

dns-server value 10.1.1.3

Question 13

Refer to the exhibit.

The customer can establish a Cisco AnyConnect connection without using an XML profile. When the host "ikev2" is selected in the AnyConnect drop down, the connection fails. What is the cause of this issue?

Options:

A.

The HostName is incorrect.

B.

The IP address is incorrect.

C.

Primary protocol should be SSL.

D.

UserGroup must match connection profile.

Question 14

Refer to the exhibit.

An engineer is troubleshooting a new GRE over IPsec tunnel. The tunnel is established but the engineer cannot ping from spoke 1 to spoke 2. Which type of traffic is being blocked?

Options:

A.

ESP packets from spoke2 to spoke1

B.

ISAKMP packets from spoke2 to spoke1

C.

ESP packets from spoke1 to spoke2

D.

ISAKMP packets from spoke1 to spoke2

Question 15

In a FlexVPN deployment, the spokes successfully connect to the hub, but spoke-to-spoke tunnels do not form. Which troubleshooting step solves the issue?

Options:

A.

Verify the spoke configuration to check if the NHRP redirect is enabled.

B.

Verify that the spoke receives redirect messages and sends resolution requests.

C.

Verify the hub configuration to check if the NHRP shortcut is enabled.

D.

Verify that the tunnel interface is contained within a VRF.

Question 16

A network engineer is setting up Cisco AnyConnect 4.9 on a Cisco ASA running ASA software 9.1. Cisco AnyConnect must connect to the Cisco ASA before the user logs on so that login scripts can work successfully. In addition, the VPN must connect without user intervention. Which two key steps accomplish this task? (Choose two.)

Options:

A.

Create a Network Access Manager profile with a client policy set to connect before user logon.

B.

Create a Cisco AnyConnect VPN profile with Start Before Logon set to true.

C.

Issue an identity certificate to the trusted root CA folder in the machine store.

D.

Create a Cisco AnyConnect VPN profile with Always On set to true.

E.

Create a Cisco Anyconnect VPN Management Tunnel profile.

Question 17

An engineer has configured Cisco AnyConnect VPN using IKEv2 on a Cisco IOS router. The user cannot connect in the Cisco AnyConnect client, but receives an alert message "Use a browser to gain access." Which action does the engineer take to resolve this issue?

Options:

A.

Reset user login credentials.

B.

Correct the URL address.

C.

Connect using HTTPS.

D.

Disable the HTTP server.

Question 18

A network engineer has set up a FlexVPN server to terminate multiple FlexVPN clients. The VPN tunnels are established without issue. However, when a Change of Authorization is issued by the RADIUS server, the FlexVPN server does not update the authorization of connected FlexVPN clients. Which action resolves this issue?

Options:

A.

Add the aaa server radius dynamic-author command on the FlexVPN clients.

B.

Fix the RADIUS key mismatch between the RADIUS server and FlexVPN server.

C.

Add the aaa server radius dynamic-author command on the FlexVPN server.

D.

Fix the RADIUS key mismatch between the RADIUS server and FlexVPN clients.

Question 19

An engineer is building an IKEv1 tunnel to a peer Cisco ASA, but the tunnel is failing. Based on the configuration in the exhibit, which action must be taken to allow the VPN tunnel to come up?

Options:

A.

Add a route for the 10.7.7.0/24 network to egress the outside interface.

B.

Enable IKEv1 on the outside interface.

C.

Change the IKEv1 policy number to be at least 256.

D.

Change the transform set mode to transport.

Question 20

A company needs to ensure only corporate issued laptops and devices are allowed to connect with the Cisco AnyConnect client. The solution should be applicable to multiple operating systems, including Windows, MacOS, and Linux, and should allow for remote remediation if a corporate issued device is stolen. Which solution should be used to accomplish these goals?

Options:

A.

Use a DAP registry check on the system to determine the relationship with the corporate domain.

B.

Use a DAP file check on the system to determine the relationship with the corporate domain.

C.

Install and authenticate user certificates on the corporate devices.

D.

Install and authenticate machine certificates on the corporate devices

Question 21

Which two statements about the Cisco ASA Clientless SSL VPN solution are true? (Choose two.)

Options:

A.

When a client connects to the Cisco ASA WebVPN portal and tries to access HTTP resources through the URL bar, the client uses the local DNS to perform FQDN resolution.

B.

The rewriter enable command under the global webvpn configuration enables the rewriter functionality because that feature is disabled by default.

C.

A Cisco ASA can simultaneously allow Clientless SSL VPN sessions and AnyConnect client sessions.

D.

When a client connects to the Cisco ASA WebVPN portal and tries to access HTTP resources through the URL bar, the ASA uses its configured DNS servers to perform FQDN resolution.

E.

Clientless SSLVPN provides Layer 3 connectivity into the secured network.

Page: 1 / 5
Total 146 questions