Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

Cisco 300-730 Dumps

Page: 1 / 18
Total 175 questions

Implementing Secure Solutions with Virtual Private Networks (SVPN) Questions and Answers

Question 1

Refer to the exhibit.

as

An SSL client is connecting to an ASA headend. The session fails with the message “Connection attempt has timed out. Please verify Internet connectivity.” Based on how the packet is processed, which phase is causing the failure?

Options:

A.

phase 9: rpf-check

B.

phase 5: NAT

C.

phase 4: ACCESS-LIST

D.

phase 3: UN-NAT

Question 2

Refer to the exhibit.

as

Client 1 cannot communicate with client 2. Both clients are using Cisco AnyConnect and have established a successful SSL VPN connection to the hub ASA. Which command on the ASA is missing?

Options:

A.

dns-server value 10.1.1.2

B.

same-security-traffic permit intra-interface

C.

same-security-traffic permit inter-interface

D.

dns-server value 10.1.1.3

Question 3

Which command is used to troubleshoot an IPv6 FlexVPN spoke-to-hub connectivity failure?

Options:

A.

show crypto ikev2 sa

B.

show crypto isakmp sa

C.

show crypto gkm

D.

show crypto identity

Question 4

Refer to the exhibit.

as

Which type of mismatch is causing the problem with the IPsec VPN tunnel?

Options:

A.

crypto access list

B.

Phase 1 policy

C.

transform set

D.

preshared key

Question 5

Refer to the exhibit.

as

A site-to-site tunnel between two sites is not coming up. Based on the debugs, what is the cause of this issue?

Options:

A.

An authentication failure occurs on the remote peer.

B.

A certificate fragmentation issue occurs between both sides.

C.

UDP 4500 traffic from the peer does not reach the router.

D.

An authentication failure occurs on the router.

Question 6

Refer to the exhibit.

as

What is a result of this configuration?

Options:

A.

Spoke 1 fails the authentication because the authentication methods are incorrect.

B.

Spoke 2 passes the authentication to the hub and successfully proceeds to phase 2.

C.

Spoke 2 fails the authentication because the remote authentication method is incorrect.

D.

Spoke 1 passes the authentication to the hub and successfully proceeds to phase 2.

Question 7

Refer to the exhibit.

as

Based on the debug output, which type of mismatch is preventing the VPN from coming up?

Options:

A.

interesting traffic

B.

lifetime

C.

preshared key

D.

PFS

Question 8

An engineer is troubleshooting a new DMVPN setup on a Cisco IOS router. After the show crypto isakmp sa command is issued, a response is returned of "MM_NO_STATE." Why does this failure occur?

Options:

A.

The ISAKMP policy priority values are invalid.

B.

ESP traffic is being dropped.

C.

The Phase 1 policy does not match on both devices.

D.

Tunnel protection is not applied to the DMVPN tunnel.

Question 9

In a FlexVPN deployment, the spokes successfully connect to the hub, but spoke-to-spoke tunnels do not form. Which troubleshooting step solves the issue?

Options:

A.

Verify the spoke configuration to check if the NHRP redirect is enabled.

B.

Verify that the spoke receives redirect messages and sends resolution requests.

C.

Verify the hub configuration to check if the NHRP shortcut is enabled.

D.

Verify that the tunnel interface is contained within a VRF.

Question 10

Refer to the exhibit.

as

The customer can establish a Cisco AnyConnect connection without using an XML profile. When the host "ikev2" is selected in the AnyConnect drop down, the connection fails. What is the cause of this issue?

Options:

A.

The HostName is incorrect.

B.

The IP address is incorrect.

C.

Primary protocol should be SSL.

D.

UserGroup must match connection profile.

Question 11

Refer to the exhibit.

as

An engineer is troubleshooting a new GRE over IPsec tunnel. The tunnel is established but the engineer cannot ping from spoke 1 to spoke 2. Which type of traffic is being blocked?

Options:

A.

ESP packets from spoke2 to spoke1

B.

ISAKMP packets from spoke2 to spoke1

C.

ESP packets from spoke1 to spoke2

D.

ISAKMP packets from spoke1 to spoke2

Question 12

Which IKE identity does an IOS/IOS-XE headend expect to receive if an IPsec Cisco AnyConnect client uses default settings?

Options:

A.

*$SecureMobilityClient$*

B.

*$AnyConnectClient$*

C.

*$RemoteAccessVpnClient$*

D.

*$DfltlkeldentityS*

Question 13

Refer to the exhibit.

as

What is configured as a result of this command set?

Options:

A.

FlexVPN client profile for IPv6

B.

FlexVPN server to authorize groups by using an IPv6 external AAA

C.

FlexVPN server for an IPv6 dVTI session

D.

FlexVPN server to authenticate IPv6 peers by using EAP

Question 14

Refer to the exhibit.

as

Which value must be configured in the User Group field when the Cisco AnyConnect Profile is created to connect to an ASA headend with IPsec as the primary protocol?

Options:

A.

address-pool

B.

group-alias

C.

group-policy

D.

tunnel-group

Question 15

Which requirement is needed to use local authentication for Cisco AnyConnect Secure Mobility Clients that connect to a FlexVPN server?

Options:

A.

use of certificates instead of username and password

B.

EAP-AnyConnect

C.

EAP query-identity

D.

AnyConnect profile

Question 16

Which command automatically initiates a smart tunnel when a user logs in to the WebVPN portal page?

Options:

A.

auto-upgrade

B.

auto-connect

C.

auto-start

D.

auto-run

Question 17

Which configuration construct must be used in a FlexVPN tunnel?

Options:

A.

EAP configuration

B.

multipoint GRE tunnel interface

C.

IKEv1 policy

D.

IKEv2 profile

Question 18

Refer to the exhibit.

as

Which two commands under the tunnel-group webvpn-attributes result in a Cisco AnyConnect user receiving the AnyConnect prompt in the exhibit? (Choose two.)

Options:

A.

group-url https://172.16.31.10/General enable

B.

group-policy General internal

C.

authentication aaa

D.

authentication certificate

E.

group-alias General enable

Question 19

Refer to the exhibit.

as

Based on the exhibit, why are users unable to access CCNP Webserver bookmark?

Options:

A.

The URL is being blocked by a WebACL.

B.

The ASA cannot resolve the URL.

C.

The bookmark has been disabled.

D.

The user cannot access the URL.

Question 20

Under which section must a bookmark or URL list be configured on a Cisco ASA to be available for clientless SSLVPN users?

Options:

A.

tunnel-group (general-attributes)

B.

tunnel-group (webvpn-attributes)

C.

webvpn (group-policy)

D.

webvpn (global configuration)

Question 21

Which two features provide headend resiliency for Cisco AnyConnect clients? (Choose two.)

Options:

A.

AnyConnect Auto Reconnect

B.

AnyConnect Network Access Manager

C.

AnyConnect Backup Servers

D.

ASA failover

E.

AnyConnect Always On

Question 22

Cisco AnyConnect Secure Mobility Client has been configured to use IKEv2 for one group of users and SSL for another group. When the administrator configures a new AnyConnect release on the Cisco ASA, the IKEv2 users cannot download it automatically when they connect. What might be the problem?

Options:

A.

The XML profile is not configured correctly for the affected users.

B.

The new client image does not use the same major release as the current one.

C.

Client services are not enabled.

D.

Client software updates are not supported with IKEv2.

Question 23

What are two functions of ECDH and ECDSA? (Choose two.)

Options:

A.

nonrepudiation

B.

revocation

C.

digital signature

D.

key exchange

E.

encryption

Question 24

Which benefit of FlexVPN is a limitation of DMVPN using IKEv1?

Options:

A.

GRE encapsulation allows for forwarding of non-IP traffic.

B.

IKE implementation can install routes in routing table.

C.

NHRP authentication provides enhanced security.

D.

Dynamic routing protocols can be configured.

Question 25

What is a requirement for smart tunnels to function properly?

Options:

A.

Java or ActiveX must be enabled on the client machine.

B.

Applications must be UDP.

C.

Stateful failover must not be configured.

D.

The user on the client machine must have admin access.

Question 26

Which two commands help determine why the NHRP registration process is not being completed even after the IPsec tunnel is up? (Choose two.)

Options:

A.

show crypto isakmp sa

B.

show ip traffic

C.

show crypto ipsec sa

D.

show ip nhrp traffic

E.

show dmvpn detail

Question 27

Which VPN does VPN load balancing on the ASA support?

Options:

A.

VTI

B.

IPsec site-to-site tunnels

C.

L2TP over IPsec

D.

Cisco AnyConnect

Question 28

Which two remote access VPN solutions support SSL? (Choose two.)

Options:

A.

FlexVPN

B.

clientless

C.

EZVPN

D.

L2TP

E.

Cisco AnyConnect

Question 29

Refer to the exhibit.

as

All internal clients behind the ASA are port address translated to the public outside interface that has an IP address of 3.3.3.3. Client 1 and client 2 have established successful SSL VPN connections to the ASA. What must be implemented so that "3.3.3.3" is returned from a browser search on the IP address?

Options:

A.

Same-security-traffic permit inter-interface under Group Policy

B.

Exclude Network List Below under Group Policy

C.

Tunnel All Networks under Group Policy

D.

Tunnel Network List Below under Group Policy

Question 30

Which technology works with IPsec stateful failover?

Options:

A.

GLBR

B.

HSRP

C.

GRE

D.

VRRP

Question 31

Which feature of GETVPN is a limitation of DMVPN and FlexVPN?

Options:

A.

sequence numbers that enable scalable replay checking

B.

enabled use of ESP or AH

C.

design for use over public or private WAN

D.

no requirement for an overlay routing protocol

Question 32

Which technology is used to send multicast traffic over a site-to-site VPN?

Options:

A.

GRE over IPsec on IOS router

B.

GRE over IPsec on FTD

C.

IPsec tunnel on FTD

D.

GRE tunnel on ASA

Question 33

Where is split tunneling defined for IKEv2 remote access clients on a Cisco router?

Options:

A.

IKEv2 authorization policy

B.

Group Policy

C.

virtual template

D.

webvpn context

Question 34

A network engineer is implementing a FlexVPN tunnel between two Cisco IOS routers. The FlexVPN tunnels will terminate on encrypted traffic on an interface configured with an IP MTU of 1500, and the company has a security policy to drop fragmented traffic coming into or leaving the network. The tunnel will be used to transfer TFTP data between users and internal servers. When the TFTP traffic is not traversing a VPN, it can have a maximum IP packet size of 1500. Assuming the encrypted payload will add 90 bytes, which configuration allows TFTP traffic to traverse the FlexVPN tunnel without being dropped?

Options:

A.

Set the tunnel IP MTU to 1500.

B.

Set the tunnel tcp adjust-mss to 1460.

C.

Set the tunnel IP MTU to 1400.

D.

Set the tunnel tcp adjust-mss to 1360.

Question 35

Which command shows the smart default configuration for an IPsec profile?

Options:

A.

show run all crypto ipsec profile

B.

ipsec profile does not have any smart default configuration

C.

show smart-defaults ipsec profile

D.

show crypto ipsec profile default

Question 36

as

Given the output of the show ip route command, which remote access VPN technology is in use?

Options:

A.

Reverse Route Injection

B.

FlexVPN

C.

Dynamic Crypto Map

D.

DMVPN

Question 37

An engineer is using DMVPN to provide secure connectivity between a data center and remote sites. Which two routing protocols should be used between the routers? (Choose two.)

Options:

A.

IS-IS

B.

BGP

C.

RIPv2

D.

OSPF

E.

EIGRP

Question 38

A company needs to ensure only corporate issued laptops and devices are allowed to connect with the Cisco AnyConnect client. The solution should be applicable to multiple operating systems, including Windows, MacOS, and Linux, and should allow for remote remediation if a corporate issued device is stolen. Which solution should be used to accomplish these goals?

Options:

A.

Use a DAP registry check on the system to determine the relationship with the corporate domain.

B.

Use a DAP file check on the system to determine the relationship with the corporate domain.

C.

Install and authenticate user certificates on the corporate devices.

D.

Install and authenticate machine certificates on the corporate devices

Question 39

An engineer is requesting an SSL certificate for a VPN load-balancing cluster in which two Cisco ASAs provide clientless SSLVPN access. The FQDN that users will enter to access the clientless VPN is asa.example.com, and users will be redirected to either asa1.example.com or asa2.example.com. The cluster FQDN and individual Cisco ASAs FQDNs resolve to IP addresses 192.168.0.1, 192.168.0.2, and 192.168.0.3 respectively. The issued certificate must be able to be used to validate the identity of either ASA in the cluster without returning any certificate validation errors. Which fields must be included in the certificate to meet these requirements?

Options:

A.

CN=*.example.com, SAN=asa.example.com

B.

CN=192.168.0.1, SAN=asa1.example.com, asa2.example.com

C.

CN=asa.example.com, SAN=asa.example.com, asa1.example.com, asa2.example.com

D.

CN=192.168.0.1, SAN=192.168.0.1, 192.168.0.2, 192.168.0.3

Question 40

Refer to the exhibit.

as

Users cannot connect via AnyConnect SSLVPN. Which action resolves this issue?

Options:

A.

Configure the ASA to act as a DHCP server.

B.

Configure the HTTP server to listen on port 443.

C.

Add an IPsec preshared key to the group policy.

D.

Add ssl-client to the allowed list of VPN protocols.

Question 41

An engineer has integrated a new DMVPN to link remote offices across the internet using Cisco IOS routers. When connecting to remote sites, pings and voice data appear to flow properly, and all tunnel stats show that they are up. However, when trying to connect to a remote server using RDP, the connection fails. Which action resolves this issue?

Options:

A.

Adjust the MTU size within the routers.

B.

Add RDP port to the extended ACL.

C.

Replace certificate on the RDP server.

D.

Change DMVPN timeout values.

Question 42

While troubleshooting, an engineer finds that the show crypto isakmp sa command indicates that the last state of the tunnel is MM_KEY_EXCH. What is the next step that should be taken to resolve this issue?

Options:

A.

Verify that the ISAKMP proposals match.

B.

Ensure that UDP 500 is not being blocked between the devices.

C.

Correct the peer's IP address on the crypto map.

D.

Confirm that the pre-shared keys match on both devices.

Question 43

Which VPN technology must be used to ensure that routers are able to dynamically form connections with each other rather than sending traffic through a hub and be able to advertise routes without the use of a dynamic routing protocol?

Options:

A.

FlexVPN

B.

DMVPN Phase 3

C.

DMVPN Phase 2

D.

GETVPN

Question 44

A network engineer must expand a company's Cisco AnyConnect solution. Currently, a Cisco ASA is set up in North America and another will be installed in Europe with a different IP address. Users should connect to the ASA that has the lowest Round Trip Time from their network location as measured by the AnyConnect client. Which solution must be implemented to meet this requirement?

Options:

A.

VPN Load Balancing

B.

IP SLA

C.

DNS Load Balancing

D.

Optimal Gateway Selection

Question 45

Refer to the exhibit.

as

Which two tunnel types produce the show crypto ipsec sa output seen in the exhibit? (Choose two.)

Options:

A.

crypto map

B.

DMVPN

C.

GRE

D.

FlexVPN

E.

VTI

Question 46

Which two parameters help to map a VPN session to a tunnel group without using the tunnel-group list? (Choose two.)

Options:

A.

group-alias

B.

certificate map

C.

optimal gateway selection

D.

group-url

E.

AnyConnect client version

Question 47

A second set of traffic selectors is negotiated between two peers using IKEv2. Which IKEv2 packet will contain details of the exchange?

Options:

A.

IKEv2 IKE_SA_INIT

B.

IKEv2 INFORMATIONAL

C.

IKEv2 CREATE_CHILD_SA

D.

IKEv2 IKE_AUTH

Question 48

Which statement about GETVPN is true?

Options:

A.

The configuration that defines which traffic to encrypt originates from the key server.

B.

TEK rekeys can be load-balanced between two key servers operating in COOP.

C.

The pseudotime that is used for replay checking is synchronized via NTP.

D.

Group members must acknowledge all KEK and TEK rekeys, regardless of configuration.

Question 49

Refer to the exhibit.

as

A customer cannot establish an IKEv2 site-to-site VPN tunnel between two Cisco ASA devices. Based on the syslog message, which action brings up the VPN tunnel?

Options:

A.

Reduce the maximum SA limit on the local Cisco ASA.

B.

Increase the maximum in-negotiation SA limit on the local Cisco ASA.

C.

Remove the maximum SA limit on the remote Cisco ASA.

D.

Correct the crypto access list on both Cisco ASA devices.

Question 50

Which method dynamically installs the network routes for remote tunnel endpoints?

Options:

A.

policy-based routing

B.

CEF

C.

reverse route injection

D.

route filtering

Question 51

Which two changes must be made in order to migrate from DMVPN Phase 2 to Phase 3 when EIGRP is configured? (Choose two.)

Options:

A.

Add NHRP shortcuts on the hub.

B.

Add NHRP redirects on the spoke.

C.

Disable EIGRP next-hop-self on the hub.

D.

Enable EIGRP next-hop-self on the hub.

E.

Add NHRP redirects on the hub.

Question 52

On a FlexVPN hub-and-spoke topology where spoke-to-spoke tunnels are not allowed, which command is needed for the hub to be able to terminate FlexVPN tunnels?

Options:

A.

interface virtual-access

B.

ip nhrp redirect

C.

interface tunnel

D.

interface virtual-template

Page: 1 / 18
Total 175 questions