Quiz 300-209, Implementing Cisco Secure Mobility Solutions (SIMOS)
Which two technologies are considered to be Suite B cryptography?
Which protocol does DTLS use for its transport?
Topology:
What is being used as the authentication method on the branch ISR?
Which transform set is being used on the branch ISR?
what state is the IKE security association in on the Cisco ASA?
Which crypto map tag is being used on the Cisco ASA?
Which two are characteristics of GETVPN?
Which two are valid configuration constructs on a Cisco IOS router?
Which four activities does the Key Server perform in a GETVPN deployment?