Which two technologies are considered to be Suite B cryptography? (Choose two.)
A.
MD5
B.
SHA2
C.
Elliptical Curve Diffie-Hellman
D.
3DES
E.
DES
Which two technologies are considered to be Suite B cryptography? (Choose two.)
Which two technologies are considered to be Suite B cryptography? (Choose two.)
A.
MD5
B.
SHA2
C.
Elliptical Curve Diffie-Hellman
D.
3DES
E.
DES
QUESTION
You have deployed new Cisco AnyConnect start before logon modules and set the configuration to download modules before logon, but all client connections continue to use the previous version of the module. Which action must you take to correct the problem?
A. Configure start before logon in the client profile.
B. Configure a group policy to prompt the user to download the updated module.
C. Define the modules for download in the client profile.
D. Define the modules for download in the group policy.
Answer: A
QUESTION
Which feature do you include in a highly available system to account for potential site failures?
A. geographical separation of redundant devices
B. hot/standby failover pairs
C. Cisco ACE load-balancing with VIP
D. dual power supplies
Answer: A
QUESTION
Refer to the exhibit. Which VPN solution does this configuration represent?
A. DMVPN
B. GETVPN
C. FlexVPN
D. site-to-site
Answer: B
QUESTION
Which VPN type can be used to provide secure remote access from public internet cafes and airport kiosks?
A. site-to-site
B. business-to-business
C. Clientless SSL
D. DMVPN
Answer: C
QUESTION
Refer to the exhibit. Which VPN solution does this configuration represent?
A. Cisco AnyConnect (IKEv2)
B. site-to-site
C. DMVPN
D. SSL VPN
Answer: D
QUESTION
What must be enabled in the web browser of the client computer to support Clientless SSL VPN?
A. cookies
B. ActiveX
C. Silverlight
D. popups
Answer: A
QUESTION
Which VPN feature allows remote access clients to print documents to local network printers?
A. Reverse Route Injection
B. split tunneling
C. loopback addressing
D. dynamic virtual tunnels
Answer: B
QUESTION
Which option is most effective at preventing a remote access VPN user from bypassing the corporate transparent web proxy?
A. using the proxy-server settings of the client computer to specify a PAC file for the client computer to download
B. instructing users to use the corporate proxy server for all web browsing
C. disabling split tunneling
D. permitting local LAN access
Answer: C
QUESTION
Which option is an example of an asymmetric algorithm?
A. 3DES
B. IDEA
C. AES
D. RSA
Answer: D
2018 New 300-208 Exam Questions & Answers PDF:
https://drive.google.com/drive/folders/0B75b5xYLjSSNdm14RFVqa0Q1YUU?usp=sharing