ExamGecko
Home Home / Cisco / 300-730

Cisco 300-730 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











A network engineer is configuring a server. The router will terminate encrypted VPN connections on g0/0, which is in the VRF "Internet". The clear-text traffic that must be encrypted before being sent out traverses g0/1, which is in the VRF

"Internal". Which two VRF-specific configurations allow VPN traffic to traverse the VRF-aware interfaces? (Choose two.)

A.

Under the IKEv2 profile, add the ivrf Internal command.

A.

Under the IKEv2 profile, add the ivrf Internal command.

Answers
B.

Under the virtual-template interface, add the ip vrf forwarding Internet command.

B.

Under the virtual-template interface, add the ip vrf forwarding Internet command.

Answers
C.

Under the IKEv2 profile, add the match fvrf Internal command.

C.

Under the IKEv2 profile, add the match fvrf Internal command.

Answers
D.

Under the IKEv2 profile, add the match fvrf Internet command.

D.

Under the IKEv2 profile, add the match fvrf Internet command.

Answers
E.

Under the virtual-template interface, add the tunnel vrf Internet command.

E.

Under the virtual-template interface, add the tunnel vrf Internet command.

Answers
Suggested answer: D, E

Explanation:

https://www.cisco.com/c/en/us/support/docs/security/flexvpn/116000-flexvpn-config-00.html

crypto ikev2 profile CProfile

match fvrf internet // ('out vrf')

...

virtual-template 1

...

interface virtual-template 1 type tunnel

vrf forwarding internal // (internal vrf)

...

tunnel vrf internet // (out vrf

What is a characteristic of GETVPN?

A.

An ACL that defines interesting traffic must be configured and applied to the crypto map.

A.

An ACL that defines interesting traffic must be configured and applied to the crypto map.

Answers
B.

Quick mode is used to create an IPsec SA.

B.

Quick mode is used to create an IPsec SA.

Answers
C.

The remote peer for the IPsec session is configured as part of the crypto map.

C.

The remote peer for the IPsec session is configured as part of the crypto map.

Answers
D.

All peers have one IPsec SPI for inbound and outbound communication.

D.

All peers have one IPsec SPI for inbound and outbound communication.

Answers
Suggested answer: D

Explanation:


Refer to the exhibit.

Users cannot connect via AnyConnect SSLVPN. Which action resolves this issue?

A.

Configure the ASA to act as a DHCP server.

A.

Configure the ASA to act as a DHCP server.

Answers
B.

Configure the HTTP server to listen on port 443.

B.

Configure the HTTP server to listen on port 443.

Answers
C.

Add an IPsec preshared key to the group policy.

C.

Add an IPsec preshared key to the group policy.

Answers
D.

Add ssl-client to the allowed list of VPN protocols.

D.

Add ssl-client to the allowed list of VPN protocols.

Answers
Suggested answer: D

An administrator must guarantee that remote access users are able to reach printers on their local LAN after a VPN session is established to the headquarters. All other traffic should be sent over the tunnel. Which split-tunnel policy reduces the configuration on the ASA headend?

A.

include specified

A.

include specified

Answers
B.

exclude specified

B.

exclude specified

Answers
C.

tunnel specified

C.

tunnel specified

Answers
D.

dynamic exclude

D.

dynamic exclude

Answers
Suggested answer: B

Explanation:

You could in theory 'tunnel specified' and list every subnet aside from the local one in the split tunnellist, but that is cumbersome and clearly not the best answer from the 'reduce the configuration'requirement. Exclude only the local subnet and continue with your day.

Refer to the exhibit.

Given the output of the show ip route command, which remote access VPN technology is in use?

A.

Reverse Route Injection

A.

Reverse Route Injection

Answers
B.

FlexVPN

B.

FlexVPN

Answers
C.

Dynamic Crypto Map

C.

Dynamic Crypto Map

Answers
D.

DMVPN

D.

DMVPN

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/15-2mt/sec-flex-spoke.html

A network engineer is installing Cisco AnyConnect on company laptops so that users can access corporate resources remotely. The VPN concentrator is a Cisco router running IOS-XE 16.9.1 code and configured as a FlexVPN server that uses local authentication and *$Cisc431089017$* as the key-id for the IKEv2 profile. Which two steps must be taken on the computer to allow a successful AnyConnect connection to the router? (Choose two.)

A.

In the Cisco AnyConnect XML profile, set the IPsec Authentication method to EAP-AnyConnect.

A.

In the Cisco AnyConnect XML profile, set the IPsec Authentication method to EAP-AnyConnect.

Answers
B.

In the Cisco AnyConnect XML profile, add the hostname and host address to the server list.

B.

In the Cisco AnyConnect XML profile, add the hostname and host address to the server list.

Answers
C.

In the Cisco AnyConnect XML profile, set the user group field to DefaultAnyConnectClientGroup.

C.

In the Cisco AnyConnect XML profile, set the user group field to DefaultAnyConnectClientGroup.

Answers
D.

In the Cisco AnyConnect Local Policy, set the BypassDownloader option in the local to true.

D.

In the Cisco AnyConnect Local Policy, set the BypassDownloader option in the local to true.

Answers
E.

In the Cisco AnyConnect Local Policy, add the router IP address to the Update Policy.

E.

In the Cisco AnyConnect Local Policy, add the router IP address to the Update Policy.

Answers
Suggested answer: B, E

Explanation:

B) In the CiscoAnyConnect XML profile, adding the hostname and host address to the server list ensures that theAnyConnect client knows the address of the VPN concentrator (router) to connect to.

E. In the CiscoAnyConnect Local Policy, adding the router IP address to the Update Policy allows the client to connectto the router for updates and configuration.

A network engineer is setting up Cisco AnyConnect 4.9 on a Cisco ASA running ASA software 9.1.

Cisco AnyConnect must connect to the Cisco ASA before the user logs on so that login scripts can work successfully. In addition, the VPN must connect without user intervention. Which two key steps accomplish this task? (Choose two.)

A.

Create a Network Access Manager profile with a client policy set to connect before user logon.

A.

Create a Network Access Manager profile with a client policy set to connect before user logon.

Answers
B.

Create a Cisco AnyConnect VPN profile with Start Before Logon set to true.

B.

Create a Cisco AnyConnect VPN profile with Start Before Logon set to true.

Answers
C.

Issue an identity certificate to the trusted root CA folder in the machine store.

C.

Issue an identity certificate to the trusted root CA folder in the machine store.

Answers
D.

Create a Cisco AnyConnect VPN profile with Always On set to true.

D.

Create a Cisco AnyConnect VPN profile with Always On set to true.

Answers
E.

Create a Cisco Anyconnect VPN Management Tunnel profile.

E.

Create a Cisco Anyconnect VPN Management Tunnel profile.

Answers
Suggested answer: B, C

Explanation:

https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/215442-configure-anyconnect-management-vpn-tunn.html

A network engineer has almost finished setting up a clientless VPN that allows remote users to access internal HTTP servers. Users must enter their username and password twice: once on the clientless VPN web portal and again to log in to internal HTTP servers. The Cisco ASA and the HTTP servers use the same Active Directory server to authenticate users. Which next step must be taken to allow users to enter their password only once?

A.

Use LDAPS and add password management to the clientless tunnel group.

A.

Use LDAPS and add password management to the clientless tunnel group.

Answers
B.

Configure auto-sign-on using NTLM authentication.

B.

Configure auto-sign-on using NTLM authentication.

Answers
C.

Set up the Cisco ASA to authenticate users via a SAML 2.0 IDP.

C.

Set up the Cisco ASA to authenticate users via a SAML 2.0 IDP.

Answers
D.

Create smart tunnels for the HTTP servers.

D.

Create smart tunnels for the HTTP servers.

Answers
Suggested answer: B

What must be configured in a FlexVPN deployment to allow for direct communication between spokes connected to different hubs?

A.

EIGRP must be used as routing protocol.

A.

EIGRP must be used as routing protocol.

Answers
B.

Hub routers must be on same Layer 2 network.

B.

Hub routers must be on same Layer 2 network.

Answers
C.

Load balancing must be disabled.

C.

Load balancing must be disabled.

Answers
D.

A GRE tunnel must exist between hub routers.

D.

A GRE tunnel must exist between hub routers.

Answers
Suggested answer: D

Refer to the exhibit.

An engineer has configured a spoke to connect to a FlexVPN hub. The tunnel is up, but pings fail when the engineer attempts to reach host 192.168.200.10 behind the spoke, and traffic is sourced from host 192.168.100.3, which is behind the FlexVPN server. Based on packet captures, the engineer discovers that host 192.168.200.10 receives the icmp echo and sends an icmp reply that makes it to the inside interface of the spoke. Based on the output in the exhibit captured on the spoke by the engineer, which action resolves this issue?

A.

Add the aaa authorization group cert list default default command to the spoke ikev2 profile.

A.

Add the aaa authorization group cert list default default command to the spoke ikev2 profile.

Answers
B.

Add the route set remote ipv4 192.168.200.0 255.255.255.0 command to the hub authorization policy.

B.

Add the route set remote ipv4 192.168.200.0 255.255.255.0 command to the hub authorization policy.

Answers
C.

Add the aaa authorization group cert list default default command to the hub ikev2 profile.

C.

Add the aaa authorization group cert list default default command to the hub ikev2 profile.

Answers
D.

Add the route set remote ipv4 192.168.100.0 255.255.255.0 command to the spoke authorization policy.

D.

Add the route set remote ipv4 192.168.100.0 255.255.255.0 command to the spoke authorization policy.

Answers
Suggested answer: D
Total 175 questions
Go to page: of 18