ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 3

Question list
Search
Search

Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?

A.

3DES

A.

3DES

Answers
B.

RSA

B.

RSA

Answers
C.

DES

C.

DES

Answers
D.

AES

D.

AES

Answers
Suggested answer: B

Explanation:

Compared to RSA, the prevalent public-key cryptography of the Internet today, Elliptic Curve Cryptography (ECC) offers smaller key sizes, faster computation,as well as memory, energy and bandwidth savings and is thus better suited forsmall devices.

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

A.

authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX

A.

authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX

Answers
B.

authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX

B.

authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX

Answers
C.

authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX

C.

authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX

Answers
D.

secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX

D.

secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX

Answers
Suggested answer: C

Explanation:

Configure a Crypto ISAKMP Key In order to configure apresharedauthentication key, enter thecrypto isakmp keycommand in global configuration mode: crypto isakmp key cisco123 address 172.16.1.1 https://community.cisco.com/t5/vpn/isakmp-with-0-0-0-0-dmvpn/td-p/4312380


Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

A.

DMVPN

A.

DMVPN

Answers
B.

FlexVPN

B.

FlexVPN

Answers
C.

IPsec DVTI

C.

IPsec DVTI

Answers
D.

GET VPN

D.

GET VPN

Answers
Suggested answer: D

Explanation:

Cisco's Group Encrypted Transport VPN (GETVPN) introduces the concept of a trusted group to eliminate point-to-point tunnels and their associated overlay routing. All group members (GMs) share a common security association (SA), also known as a group SA. This enables GMs to decrypt traffic that was encrypted by any other GM.

GETVPN provides instantaneous large-scale any-to-any IP connectivity using a group IPsec security paradigm.

Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/group-encryptedtransport-vpn/GETVPN_DIG_version_2_0_External.pdf

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)

A.

Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically

A.

Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically

Answers
B.

The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.

B.

The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.

Answers
C.

The IPsec configuration that is set up on the active device must be duplicated on the standby device

C.

The IPsec configuration that is set up on the active device must be duplicated on the standby device

Answers
D.

Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.

D.

Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.

Answers
E.

The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device

E.

The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device

Answers
Suggested answer: C, E

Explanation:

Stateful failover for IP Security (IPsec) enables a router to continue processing and forwarding IPsec packets after a planned or unplanned outage occurs. Customers employ a backup (secondary) router that automatically takes over the tasks of the active (primary) router if the active router loses connectivity for any reason. This failover process is transparent to users and does not require adjustment or reconfiguration of any remote peer.

Stateful failover for IPsec requires that your network contains two identical routers that are available to be either the primary or secondary device. Both routers should be the same type of device, have the same CPU and memory, and have either no encryption accelerator or identical encryption accelerators.

Prerequisites for Stateful Failover for IPsec

Complete, Duplicate IPsec and IKE Configuration on the Active and Standby Devices This document assumes that you have a complete IKE and IPsec configuration.

The IKE and IPsec configuration that is set up on the active device must be duplicated on the standby device.

That is, the crypto configuration must be identical with respect to Internet Security Association and Key Management Protocol (ISAKMP) policy, ISAKMP keys (preshared), IPsec profiles, IPsec transform sets, all crypto map sets that are used for stateful failover, all access control lists (ACLs) that are used in match address statements on crypto map sets, all AAA configurations used for crypto, client configuration groups, IP local pools used for crypto, and ISAKMP profiles.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnav/configuration/15-mt/sec-vpnavailability-15-mt-book/sec-state-fail-ipsec.htmlAlthough the prerequisites only stated that "Both routers should be the same type of device" but inthe"Restrictions for Stateful Failover for IPsec" section of the link above, it requires "Both the active andstandby devices must run the identical version of the Cisco IOS software" so answer E is better thananswer B.

Which VPN technology can support a multivendor environment and secure traffic between sites?

A.

SSL VPN

A.

SSL VPN

Answers
B.

GET VPN

B.

GET VPN

Answers
C.

FlexVPN

C.

FlexVPN

Answers
D.

DMVPN

D.

DMVPN

Answers
Suggested answer: C

Explanation:

FlexVPN is an IKEv2-based VPN technology that provides several benefits beyond traditional site-tosite VPN implementations. FlexVPN is a standards-based solution that can interoperate with non- Cisco IKEv2 implementations. Therefore

FlexVPN can support a multivendor environment. All of the three VPN technologies support traffic between sites (site-to-site or spoke-to-spoke).

A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not being established to hostB. What action is needed to authenticate the VPN?

A.

Change isakmp to ikev2 in the command on hostA.

A.

Change isakmp to ikev2 in the command on hostA.

Answers
B.

Enter the command with a different password on hostB.

B.

Enter the command with a different password on hostB.

Answers
C.

Enter the same command on hostB.

C.

Enter the same command on hostB.

Answers
D.

Change the password on hostA to the default password.

D.

Change the password on hostA to the default password.

Answers
Suggested answer: C

Refer to the exhibit.

A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command output?

A.

hashing algorithm mismatch

A.

hashing algorithm mismatch

Answers
B.

encryption algorithm mismatch

B.

encryption algorithm mismatch

Answers
C.

authentication key mismatch

C.

authentication key mismatch

Answers
D.

interesting traffic was not applied

D.

interesting traffic was not applied

Answers
Suggested answer: C

What is a difference between FlexVPN and DMVPN?

A.

DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1

A.

DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1

Answers
B.

DMVPN uses only IKEv1 FlexVPN uses only IKEv2

B.

DMVPN uses only IKEv1 FlexVPN uses only IKEv2

Answers
C.

FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2

C.

FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2

Answers
D.

FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2

D.

FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2

Answers
Suggested answer: C

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

A.

TLSv1.2

A.

TLSv1.2

Answers
B.

TLSv1.1

B.

TLSv1.1

Answers
C.

BJTLSv1

C.

BJTLSv1

Answers
D.

DTLSv1

D.

DTLSv1

Answers
Suggested answer: D

Explanation:

DTLS is used for delay sensitive applications (voice and video) as its UDP based while TLS is TCP based.

Therefore DTLS offers strongest throughput performance. The throughput of DTLS at the time of AnyConnect connection can be expected to have processing performance close to VPN throughput.

What is a commonality between DMVPN and FlexVPN technologies?

A.

FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes

A.

FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes

Answers
B.

FlexVPN and DMVPN use the new key management protocol

B.

FlexVPN and DMVPN use the new key management protocol

Answers
C.

FlexVPN and DMVPN use the same hashing algorithms

C.

FlexVPN and DMVPN use the same hashing algorithms

Answers
D.

IOS routers run the same NHRP code for DMVPN and FlexVPN

D.

IOS routers run the same NHRP code for DMVPN and FlexVPN

Answers
Suggested answer: D

Explanation:

In its essence, FlexVPN is the same as DMVPN. Connections between devices are still point-to-point GRE tunnels, spoke-to-spoke connectivity is still achieved with NHRP redirect message, IOS routers even run the same NHRP code for both DMVPN and FlexVPN, which also means that both are Cisco's proprietary technologies.

Reference: https://packetpushers.net/cisco-flexvpn-dmvpn-high-level-design/

Total 631 questions
Go to page: of 64