Cisco 350-701 Practice Test - Questions Answers, Page 3
Related questions
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?
3DES
RSA
DES
AES
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX
authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
DMVPN
FlexVPN
IPsec DVTI
GET VPN
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically
The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
The IPsec configuration that is set up on the active device must be duplicated on the standby device
Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.
The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device
Which VPN technology can support a multivendor environment and secure traffic between sites?
SSL VPN
GET VPN
FlexVPN
DMVPN
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not being established to hostB. What action is needed to authenticate the VPN?
Change isakmp to ikev2 in the command on hostA.
Enter the command with a different password on hostB.
Enter the same command on hostB.
Change the password on hostA to the default password.
Refer to the exhibit.
A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command output?
hashing algorithm mismatch
encryption algorithm mismatch
authentication key mismatch
interesting traffic was not applied
What is a difference between FlexVPN and DMVPN?
DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1
DMVPN uses only IKEv1 FlexVPN uses only IKEv2
FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2
FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
TLSv1.2
TLSv1.1
BJTLSv1
DTLSv1
What is a commonality between DMVPN and FlexVPN technologies?
FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes
FlexVPN and DMVPN use the new key management protocol
FlexVPN and DMVPN use the same hashing algorithms
IOS routers run the same NHRP code for DMVPN and FlexVPN
Question