Cisco 300-730 Practice Test - Questions Answers, Page 17
List of questions
Related questions
Which two protocols does DMVPN leverage to build dynamic VPNs to multiple destinations? (Choose two.)
IKEv2
NHRP
mGRE
mBGP
GDOI
DRAG DROP
Drag and drop the GET VPN components from the left onto the correct descriptions on the right.
A network administrator wants the Cisco ASA to automatically start downloading the Cisco AnyConnect client without prompting the user to select between WebVPN or AnyConnect. Which command accomplishes this task?
anyconnect ssl df-bit-ignore enable
anyconnect ask none default anyconnect
anyconnect ask enable default anyconnect
anyconnect modules value default
An administrator is deciding which authentication protocol should be implemented for their upcoming Cisco AnyConnect deployment. A list of the security requirements from upper management are: the ability to force AnyConnect users to use complex passwords such as C1$c0451035084!, warn users a few days before their password expires, and allow users to change their password during a remote access session. Which authentication protocol must be used to meet these requirements?
LDAPS
RADIUS
Kerberos
TACACS+
Which clientless SSLVPN supported feature works when the http-only-cookie command is enabled?
Citrix load balancer
port reflector
Java rewriter -
Java plug-ins
script browser
A network engineer must expand a company's Cisco AnyConnect solution. Currently, a Cisco ASA is set up in North America and another will be installed in Europe with a different IP address. Users should connect to the ASA that has the lowest Round Trip Time from their network location as measured by the AnyConnect client. Which solution must be implemented to meet this requirement?
VPN Load Balancing
IP SLA
DNS Load Balancing
Optimal Gateway Selection
An engineer is creating an URL object on Cisco FMC. How must it be configured so that the object will match for HTTPS traffic in an access control policy?
Specify the protocol to match (HTTP or HTTPS).
Use the FQDN including the subdomain for the website.
Use the subject common name from the website certificate.
Define the path to the individual webpage that uses HTTPS.
A network administrator is deploying a Cisco IPS appliance and needs it to operate initially without affecting traffic flows. It must also collect data to provide a baseline of unwanted traffic before being reconfigured to drop it. Which Cisco IPS mode meets these requirements?
failsafe
inline tap
promiscuous
bypass
A network administrator wants to block traffic to a known malware site at https:/www.badsite.com and all subdomains while ensuring no packets from any internal client are sent to that site. Which type of policy must the network administrator use to accomplish this goal?
Access Control policy with URL filtering
Prefilter policy
DNS policy
SSL policy
An engineer must investigate a connectivity issue and decides to use the packet capture feature on Cisco FTD. The goal is to see the real packet going through the Cisco FTD device and see Snort detection actions as a part of the output. After the capture-traffic command is issued, only the packets are displayed. Which action resolves this issue?
Specify the trace using the -T option after the capture-traffic command
Perform the trace within the Cisco FMC GUI instead of the Cisco FMC CLI
Use the verbose option as a part of the capture-traffic command
Use the capture command and specify the trace option to get the required information
Question