Which technology is represented by this configuration?

Refer to the exhibit. Which technology is represented by this configuration?

Refer to the exhibit. Which technology is represented by this configuration?

A.
AAA for FlexVPN

B.
AAA for EzVPN

C.
TACACS+ command authorization

D.
local command authorization



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Ruth Griffith

Ruth Griffith

QUESTION
In FlexVPN, what command can an administrator use to create a virtual template interface that can be configured and applied dynamically to create virtual access interfaces?

A. interface virtual-template number type template
B. interface virtual-template number type tunnel
C. interface template number type virtual
D. interface tunnel-template number

Answer: B

QUESTION
In FlexVPN, what is the role of a NHRP resolution request?

A. It allows these entities to directly communicate without requiring traffic to use an intermediate hop
B. It dynamically assigns VPN users to a group
C. It blocks these entities from to directly communicating with each other
D. It makes sure that each VPN spoke directly communicates with the hub

Answer: A

QUESTION
What are three benefits of deploying a GET VPN? (Choose three.)

A. It provides highly scalable point-to-point topologies.
B. It allows replication of packets after encryption.
C. It is suited for enterprises running over a DMVPN network.
D. It preserves original source and destination IP address information.
E. It simplifies encryption management through use of group keying.
F. It supports non-IP protocols.

Answer: BDE

QUESTION
What is the default topology type for a GET VPN?

A. point-to-point
B. hub-and-spoke
C. full mesh
D. on-demand spoke-to-spoke

Answer: C

QUESTION
Which two GDOI encryption keys are used within a GET VPN network? (Choose two.)

A. key encryption key
B. group encryption key
C. user encryption key
D. traffic encryption key

Answer: AD

QUESTION
What are the three primary components of a GET VPN network? (Choose three.)

A. Group Domain of Interpretation protocol
B. Simple Network Management Protocol
C. server load balancer
D. accounting server
E. group member
F. key server

Answer: AEF

QUESTION
Refer to the exhibit. After the configuration is performed, which combination of devices can connect?

A. a device with an identity type of IPv4 address of 209.165.200.225 or 209.165.202.155 or a
certificate with subject name of “cisco.com”
B. a device with an identity type of IPv4 address of both 209.165.200.225 and
209.165.202.155 or a certificate with subject name containing “cisco.com”
C. a device with an identity type of IPv4 address of both 209.165.200.225 and 209.165.202.155 and
a certificate with subject name containing “cisco.com”
D. a device with an identity type of IPv4 address of 209.165.200.225 or 209.165.202.155 or a certificate
with subject name containing “cisco.com”

Answer: D

QUESTION
Which three settings are required for crypto map configuration? (Choose three.)

A. match address
B. set peer
C. set transform-set
D. set security-association lifetime
E. set security-association level per-host
F. set pfs

Answer: ABC

QUESTION
A network is configured to allow clientless access to resources inside the network. Which feature must be enabled and configured to allow SSH applications to respond on the specified port 8889?

A. auto applet download
B. port forwarding
C. web-type ACL
D. HTTP proxy

Answer: B

QUESTION
Consider this scenario. When users attempt to connect via a Cisco AnyConnect VPN session, the certificate has changed and the connection fails.
What is a possible cause of the connection failure?

A. An invalid modulus was used to generate the initial key.
B. The VPN is using an expired certificate.
C. The Cisco ASA appliance was reloaded.
D. The Trusted Root Store is configured incorrectly.

Answer: C

More: http://www.hpdumps.com/august-2016-new300-209-dumps-vce-237q-free-shared-by-braindump2gonq61-nq70.html