Cisco 300-730 Practice Test - Questions Answers, Page 8
Related questions
Which two features are valid backup options for an IOS FlexVPN client? (Choose two.)
HSRP stateless failover
DNS-based hub resolution
reactivate primary peer
tunnel pivot
need distractor
Refer to the exhibit.
Which type of VPN is used?
GETVPN
clientless SSL VPN
Cisco Easy VPN
Cisco AnyConnect SSL VPN
An engineer would like Cisco AnyConnect users to be able to reach servers within the 10.10.0.0/16 subnet while all other traffic is sent out to the Internet. Which IPsec configuration accomplishes this task?
Option A
Option B
Option C
Option D
Which Cisco AnyConnect component ensures that devices in a specific internal subnet are only accessible using port 443?
routing
WebACL
split tunnel
VPN filter
Refer to the exhibit.
Upon setting up a tunnel between two sites, users are complaining that connections to applications over the VPN are not working consistently. The output of show crypto ipsec sa was collected on one of the VPN devices. Based on this output, what should be done to fix this issue?
Lower the tunnel MTU.
Enable perfect forward secrecy.
Specify the application networks in the remote identity.
Make an adjustment to IPSec replay window.
After a user configures a connection profile with a bookmark list and tests the clientless SSLVPN connection, all of the bookmarks are grayed out. What must be done to correct this behavior?
Apply the bookmark to the correct group policy.
Specify the correct port for the web server under the bookmark.
Configure a DNS server on the Cisco ASA and verify it has a record for the web server.
Verify HTTP/HTTPS connectivity between the Cisco ASA and the web server.
Refer to the exhibit.
Which type of VPN is being configured, based on the partial configuration snippet?
GET VPN with COOP key server
GET VPN with dual group member
FlexVPN load balancer
FlexVPN backup gateway
An administrator is designing a VPN with a partner's non-Cisco VPN solution. The partner's VPN device will negotiate an IKEv2 tunnel that will only encrypt subnets 192.168.0.0/24 going to 10.0.0.0/24. Which technology must be used to meet these requirements?
VTI
crypto map
GETVPN
DMVPN
A company's remote locations connect to the data centers via MPLS. A new request requires that unicast and multicast traffic that exits in the remote locations be encrypted. Which non-tunneled technology should be used to satisfy this requirement?
SSL
FlexVPN
DMVPN
GETVPN
While troubleshooting, an engineer finds that the show crypto isakmp sa command indicates that the last state of the tunnel is MM_KEY_EXCH. What is the next step that should be taken to resolve this issue?
Verify that the ISAKMP proposals match.
Ensure that UDP 500 is not being blocked between the devices.
Correct the peer's IP address on the crypto map.
Confirm that the pre-shared keys match on both devices.
Question