ExamGecko
Home Home / Cisco / 300-730

Cisco 300-730 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











Which two protocols does DMVPN leverage to build dynamic VPNs to multiple destinations? (Choose two.)

A.

IKEv2

A.

IKEv2

Answers
B.

NHRP

B.

NHRP

Answers
C.

mGRE

C.

mGRE

Answers
D.

mBGP

D.

mBGP

Answers
E.

GDOI

E.

GDOI

Answers
Suggested answer: B, C

DRAG DROP

Drag and drop the GET VPN components from the left onto the correct descriptions on the right.


Question 162
Correct answer: Question 162

A network administrator wants the Cisco ASA to automatically start downloading the Cisco AnyConnect client without prompting the user to select between WebVPN or AnyConnect. Which command accomplishes this task?

A.

anyconnect ssl df-bit-ignore enable

A.

anyconnect ssl df-bit-ignore enable

Answers
B.

anyconnect ask none default anyconnect

B.

anyconnect ask none default anyconnect

Answers
C.

anyconnect ask enable default anyconnect

C.

anyconnect ask enable default anyconnect

Answers
D.

anyconnect modules value default

D.

anyconnect modules value default

Answers
Suggested answer: B

Explanation:

https://networklessons.com/cisco/asa-firewall/cisco-asa-anyconnect-remote-access-vpn#:~:text=The%20anyconnect%20ask%20command%20specifies,of%20the%20anyconnect%20client%20automatically.

An administrator is deciding which authentication protocol should be implemented for their upcoming Cisco AnyConnect deployment. A list of the security requirements from upper management are: the ability to force AnyConnect users to use complex passwords such as C1$c0451035084!, warn users a few days before their password expires, and allow users to change their password during a remote access session. Which authentication protocol must be used to meet these requirements?

A.

LDAPS

A.

LDAPS

Answers
B.

RADIUS

B.

RADIUS

Answers
C.

Kerberos

C.

Kerberos

Answers
D.

TACACS+

D.

TACACS+

Answers
Suggested answer: A

Explanation:

To enforce complex passwords---for example, to require that a password contain upper- and lowercase letters, numbers, and special characters---enter the password-management command in tunnel-group general-attributes configuration mode on the ASA and perform the following steps under Active Directory. https://www.cisco.com/c/en/us/td/docs/security/asa/asa97/configuration/vpn/asa-97-vpn-config/vpn-groups.html

Which clientless SSLVPN supported feature works when the http-only-cookie command is enabled?

A.

Citrix load balancer

A.

Citrix load balancer

Answers
B.

port reflector

B.

port reflector

Answers
C.

Java rewriter -

C.

Java rewriter -

Answers
D.

Java plug-ins

D.

Java plug-ins

Answers
E.

script browser

E.

script browser

Answers
Suggested answer: D

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/asa/asa94/config-guides/asdm74/vpn/asdm-74-vpn-config/webvpn-troubleshooting.html

The following Clientless SSL VPN features will not work when the http-only-cookie command is

enabled:

* Java plug-ins

* Java rewriter

* Port forwarding

* File browser

* Sharepoint features that require desktop applications (for example, MS Office applications)

* AnyConnect Web launch

* Citrix Receiver, XenDesktop, and Xenon

* Other non-browser-based and browser plugin-based applications

A network engineer must expand a company's Cisco AnyConnect solution. Currently, a Cisco ASA is set up in North America and another will be installed in Europe with a different IP address. Users should connect to the ASA that has the lowest Round Trip Time from their network location as measured by the AnyConnect client. Which solution must be implemented to meet this requirement?

A.

VPN Load Balancing

A.

VPN Load Balancing

Answers
B.

IP SLA

B.

IP SLA

Answers
C.

DNS Load Balancing

C.

DNS Load Balancing

Answers
D.

Optimal Gateway Selection

D.

Optimal Gateway Selection

Answers
Suggested answer: D

Explanation:

Optimal Gateway Selection (OGS). OGS is a feature that can be used in order to determine which gateway has the lowest Round Trip Time (RTT) and connect to that gateway. One can use the OGS feature in order to minimize latency for Internet traffic without user intervention. With OGS, Cisco AnyConnect Secure Mobility Client (AnyConnect) identifies and selects which secure gateway is best for connection or reconnection. OGS begins upon first connection or upon a reconnection at least four hours after the previous disconnection.

An engineer is creating an URL object on Cisco FMC. How must it be configured so that the object will match for HTTPS traffic in an access control policy?

A.

Specify the protocol to match (HTTP or HTTPS).

A.

Specify the protocol to match (HTTP or HTTPS).

Answers
B.

Use the FQDN including the subdomain for the website.

B.

Use the FQDN including the subdomain for the website.

Answers
C.

Use the subject common name from the website certificate.

C.

Use the subject common name from the website certificate.

Answers
D.

Define the path to the individual webpage that uses HTTPS.

D.

Define the path to the individual webpage that uses HTTPS.

Answers
Suggested answer: B

Explanation:

Use the FQDN including the subdomain for the website.According to the Firepower Management Center Configuration Guide, Version 6.61, when you create a URL object, you must use the fully qualified domain name (FQDN) of the website, including any subdomains, and omit the protocol prefix (HTTP or HTTPS). For example, to match www.example.com, you must enter www.example.com as the URL object value, not http://www.example.com or https://www.example.com. The system automatically matches both HTTP and HTTPS traffic for the same FQDN. Specifying the protocol to match (HTTP or HTTPS) is not required and will result in an invalid URL object. Using the subject common name from the website certificate or defining the path to the individual webpage that uses HTTPS are not supported options for URL objects.

A network administrator is deploying a Cisco IPS appliance and needs it to operate initially without affecting traffic flows. It must also collect data to provide a baseline of unwanted traffic before being reconfigured to drop it. Which Cisco IPS mode meets these requirements?

A.

failsafe

A.

failsafe

Answers
B.

inline tap

B.

inline tap

Answers
C.

promiscuous

C.

promiscuous

Answers
D.

bypass

D.

bypass

Answers
Suggested answer: C

Explanation:

The correct answer is C. promiscuous mode. In promiscuous mode, the Cisco IPS appliance operates as a passive device that monitors a copy of the network traffic and analyzes it for malicious activity. The appliance does not affect the traffic flow, but it can generate alerts, logs, and reports based on the configured security policy. Promiscuous mode is useful for initial deployment and baseline analysis, as well as for monitoring low-risk segments of the network12.

A network administrator wants to block traffic to a known malware site at https:/www.badsite.com and all subdomains while ensuring no packets from any internal client are sent to that site. Which type of policy must the network administrator use to accomplish this goal?

A.

Access Control policy with URL filtering

A.

Access Control policy with URL filtering

Answers
B.

Prefilter policy

B.

Prefilter policy

Answers
C.

DNS policy

C.

DNS policy

Answers
D.

SSL policy

D.

SSL policy

Answers
Suggested answer: A

Explanation:

The correct answer is A. Access Control policy with URL filtering. An Access Control policy is a type of policy that allows you to control how traffic is handled on your network based on various criteria, such as source and destination IP addresses, ports, protocols, applications, users, and URLs. URL filtering is a feature that enables you to block or allow traffic based on the URL category or reputation of the website. You can create custom URL objects to specify the exact URLs or domains that you want to block or allow. For example, you can create a URL object for https:/www.badsite.com and set it to block. This will prevent any traffic from reaching that site and any subdomains under it12.

An engineer must investigate a connectivity issue and decides to use the packet capture feature on Cisco FTD. The goal is to see the real packet going through the Cisco FTD device and see Snort detection actions as a part of the output. After the capture-traffic command is issued, only the packets are displayed. Which action resolves this issue?

A.

Specify the trace using the -T option after the capture-traffic command

A.

Specify the trace using the -T option after the capture-traffic command

Answers
B.

Perform the trace within the Cisco FMC GUI instead of the Cisco FMC CLI

B.

Perform the trace within the Cisco FMC GUI instead of the Cisco FMC CLI

Answers
C.

Use the verbose option as a part of the capture-traffic command

C.

Use the verbose option as a part of the capture-traffic command

Answers
D.

Use the capture command and specify the trace option to get the required information

D.

Use the capture command and specify the trace option to get the required information

Answers
Suggested answer: A

Explanation:

The correct answer is A. Specify the trace using the -T option after the capture-traffic command. According to the document Use Firepower Threat Defense Captures and Packet Tracer, the capture-traffic command allows you to capture packets on the Snort engine domain of the FTD device. However, by default, it only shows the packet headers and does not include the Snort detection actions. To see the Snort detection actions, you need to use the -T option, which enables tracing. For example:

capture-traffic -T

This will show the packet headers along with the Snort verdicts, such as allow, block, or replace. You can also use other options to filter or save the capture output1.

B) Performing the trace within the Cisco FMC GUI instead of the Cisco FMC CLI is not a valid option, because the FMC GUI does not support packet capture or tracing on the FTD device. You can only use the FMC GUI to view and export captures that are taken on the FTD CLI1. C) Using the verbose option as a part of the capture-traffic command is not a valid option, because there is no verbose option for this command. The verbose option is only available for the capture command, which is used to capture packets on the LINA engine domain of the FTD device1. D) Using the capture command and specifying the trace option to get the required information is not a valid option, because the capture command does not have a trace option. The capture command allows you to capture packets on the LINA engine domain of the FTD device, but it does not show the Snort detection actions. The trace option is only available for the packet-tracer command, which is used to simulate a packet going through the FTD device and show its processing steps1.

Total 175 questions
Go to page: of 18