Download New Updated (Spring 2015) Cisco 300-209 Actual Tests 1-10

By | April 22, 2015

Ensurepass

QUESTION 1

Which two are characteristics of GETVPN? (Choose two.)

 

A.

The IP header of the encrypted packet is preserved

B.

A key server is elected among all configured Group Members

C.

Unique encryption keys are computed for each Group Member

D.

The same key encryption and traffic encryption keys are distributed to all Group Members

 

Correct Answer: AD

 

 

QUESTION 2

A company has decided to migrate an existing IKEv1 VPN tunnel to IKEv2. Which two are valid configuration constructs on a Cisco IOS router? (Choose two.)

 

A.

crypto ikev2 keyring keyring-name

peer peer1

address 209.165.201.1 255.255.255.255

pre-shared-key local key1

pre-shared-key remote key2

B.

crypto ikev2 transform-set transform-set-name

esp-3des esp-md5-hmac

esp-aes esp-sha-hmac

C.

crypto ikev2 map crypto-map-name

set crypto ikev2 tunnel-group tunnel-group-name

set crypto ikev2 transform-set transform-set-name

D.

crypto ikev2 tunnel-group tunnel-group-name

match identity remote address 209.165.201.1

authentication local pre-share

authentication remote pre-share

E.

crypto ikev2 profile profile-name

match identity remote address 209.165.201.1

authentication local pre-share

authentication remote pre-share

 

Correct Answer: AE

 

 

QUESTION 3

Which four activities does the Key Server perform in a GETVPN deployment? (Choose four.)

 

A.

authenticates group members

B.

manages security policy

C.

creates group keys

D.

distributes policy/keys

E.

encrypts endpoint traffic

F.

receives policy/keys

G.

defines group members

 

Correct Answer: ABCD

 

 

 

QUESTION 4

Where is split-tunneling defined for remote access clients on an ASA?

 

A.

Group-policy

B.

Tunnel-group

C.

Crypto-map

D.

Web-VPN Portal

E.

ISAKMP client

 

Correct Answer: A

 

&nb
sp;

QUESTION 5

Which of the following could be used to configure remote access VPN Host-scan and pre- login policies?

 

A.

ASDM

B.

Connection-profile CLI command

C.

Host-scan CLI command under the VPN group policy

D.

Pre-login-check CLI command

 

Correct Answer: A

 

 

QUESTION 6

In FlexVPN, what command can an administrator use to create a virtual template inte
rface that can be configured and applied dynamically to create virtual access interfaces?

 

A.

interface virtual-template number type template

B.

interface virtual-template number type tunnel

C.

interface template number type virtual

D.

interface tunnel-template number

 

Correct Answer: B

Explanation:

Hello – here is a reference an explanation that can be included with this test.

http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/15-2mt/secflex-spoke.html#GUID-4A10927D-4C6A-4202-B01C-DA7E462F5D8A

Configuring the Virtual Tunnel Interface on FlexVPN Spoke

SUMMARY STEPS

1. enable

2. configure terminal

3. interface virtual-template number type tunnel

4. ip unnumbered tunnel number

5. ip nhrp network-id number

6. ip nhrp shortcut virtual-template-number

7. ip nhrp redirect [timeout seconds]

8. exit

 

 

QUESTION 7

In FlexVPN, what is the role of a NHRP resolution request?

 

A.

It allows these entities to directly communicate without requiring traffic to use an intermediate hop.

B.

It dynamically assigns VPN users to a group.

C.

It blocks these entities from to directly communicating with each o
ther.

D.

It makes sure that each VPN spoke directly communicates with the hub.

 

Correct Answer: A

 

 

QUESTION 8

What are three benefits of deploying a GET VPN? (Choose three.)

 

A.

It provides highly scalable point-to-point topologies.

B.

It allows replication of packets after encryption.

C.

It is suited for enterprises running over a DMVPN network.

D.

It preserves original source and destination IP address information.

E.

It simplifies encryption management through use of group keying.

F.

It supports non-IP protocols.

 

Correct Answer: BDE

 

 

QUESTION 9

What is the default topology type for a GET VPN?

 

A.

point-to-point

B.

hub-and-spoke

C.

full mesh

D.

on-demand spoke-to-spoke

 

Correct Answer: C

 

 

QUESTION 10

Which two GDOI encryption keys are used within a GET VPN network? (Choose two.)

 

A.

key encryption key

B.

group encryption key

C.

user encryption key

D.

traffic encryption key

 

Correct Answer: AD

 

Free VCE & PDF File for Cisco 300-209 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …