Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 300-730 - Implementing Secure Solutions with Virtual Private Networks (SVPN)

Page: 2 / 5
Total 175 questions

Refer to the exhibit.

Which VPN technology is allowed for users connecting to the Employee tunnel group?

A.

SSL AnyConnect

B.

IKEv2 AnyConnect

C.

crypto map

D.

clientless

Which technology is used to send multicast traffic over a site-to-site VPN?

A.

GRE over IPsec on IOS router

B.

GRE over IPsec on FTD

C.

IPsec tunnel on FTD

D.

GRE tunnel on ASA

What uses an Elliptic Curve key exchange algorithm?

A.

ECDSA

B.

ECDHE

C.

AES-GCM

D.

SHA

Which benefit of FlexVPN is a limitation of DMVPN using IKEv1?

A.

GRE encapsulation allows for forwarding of non-IP traffic.

B.

IKE implementation can install routes in routing table.

C.

NHRP authentication provides enhanced security.

D.

Dynamic routing protocols can be configured.

Cisco AnyConnect clients need to transfer large files over the VPN sessions. Which protocol provides the best throughput?

A.

SSL/TLS

B.

L2TP

C.

DTLS

D.

IPsec IKEv1

Which parameter is initially used to elect the primary key server from a group of key servers?

A.

code version

B.

highest IP address

C.

highest-priority value

D.

lowest IP address

Refer to the exhibit.

Which VPN technology is used in the exhibit?

A.

DVTI

B.

VTI

C.

DMVPN

D.

GRE

Which redundancy protocol must be implemented for IPsec stateless failover to work?

A.

SSO

B.

GLBP

C.

HSRP

D.

VRRP

What are two functions of ECDH and ECDSA? (Choose two.)

A.

nonrepudiation

B.

revocation

C.

digital signature

D.

key exchange

E.

encryption

Refer to the exhibit.

All internal clients behind the ASA are port address translated to the public outside interface that has an IP address of 3.3.3.3. Client 1 and client 2 have established successful SSL VPN connections to the ASA. What must be implemented so that "3.3.3.3" is returned from a browser search on the IP address?

A.

Same-security-traffic permit inter-interface under Group Policy

B.

Exclude Network List Below under Group Policy

C.

Tunnel All Networks under Group Policy

D.

Tunnel Network List Below under Group Policy