Quiz 300-209, Implementing Cisco Secure Mobility Solutions (SIMOS)
Which two technologies are considered to be Suite B cryptography?
Which protocol does DTLS use for its transport?
You have completed this exercise when you have configured and successfully…
What is being used as the authentication method on the branch ISR?
Which transform set is being used on the branch ISR?
what state is the IKE security association in on the Cisco ASA?
Which crypto map tag is being used on the Cisco ASA?
what address preservation with IPsec Tunnel Mode allows when GETVPN is used?
Which feature is available in IKEv1 but not IKEv2?
Which feature is enabled by the use of NHRP in a DMVPN network?