Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Security > 300-730

300-730 Implementing Secure Solutions with Virtual Private Networks (SVPN) Question and Answers

Question # 4

A Cisco AnyConnect client establishes a SSL VPN connection with an ASA at the corporate office. An engineer must ensure that the client computer meets the enterprise security policy. Which feature can update the client to meet an enterprise security policy?

A.

Endpoint Assessment

B.

Cisco Secure Desktop

C.

Basic Host Scan

D.

Advanced Endpoint Assessment

Full Access
Question # 5

An engineer is troubleshooting a new DMVPN setup on a Cisco IOS router. After the show crypto isakmp sa command is issued, a response is returned of "MM_NO_STATE." Why does this failure occur?

A.

The ISAKMP policy priority values are invalid.

B.

ESP traffic is being dropped.

C.

The Phase 1 policy does not match on both devices.

D.

Tunnel protection is not applied to the DMVPN tunnel.

Full Access
Question # 6

Which two features provide headend resiliency for Cisco AnyConnect clients? (Choose two.)

A.

AnyConnect Auto Reconnect

B.

AnyConnect Network Access Manager

C.

AnyConnect Backup Servers

D.

ASA failover

E.

AnyConnect Always On

Full Access
Question # 7

Under which section must a bookmark or URL list be configured on a Cisco ASA to be available for clientless SSLVPN users?

A.

tunnel-group (general-attributes)

B.

tunnel-group (webvpn-attributes)

C.

webvpn (group-policy)

D.

webvpn (global configuration)

Full Access
Question # 8

Refer to the exhibit.

The customer must launch Cisco AnyConnect in the RDP machine. Which IOS configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 9

Refer to the exhibit.

Which two commands under the tunnel-group webvpn-attributes result in a Cisco AnyConnect user receiving the AnyConnect prompt in the exhibit? (Choose two.)

A.

group-url https://172.16.31.10/General enable

B.

group-policy General internal

C.

authentication aaa

D.

authentication certificate

E.

group-alias General enable

Full Access
Question # 10

Refer to the exhibit.

What is configured as a result of this command set?

A.

FlexVPN client profile for IPv6

B.

FlexVPN server to authorize groups by using an IPv6 external AAA

C.

FlexVPN server for an IPv6 dVTI session

D.

FlexVPN server to authenticate IPv6 peers by using EAP

Full Access
Question # 11

Which feature allows the ASA to handle nonstandard applications and web resources so that they display correctly over a clientless SSL VPN connection?

A.

single sign-on

B.

Smart Tunnel

C.

WebType ACL

D.

plug-ins

Full Access
Question # 12

Refer to the exhibit.

Which VPN technology is allowed for users connecting to the Employee tunnel group?

A.

SSL AnyConnect

B.

IKEv2 AnyConnect

C.

crypto map

D.

clientless

Full Access
Question # 13

Cisco AnyConnect Secure Mobility Client has been configured to use IKEv2 for one group of users and SSL for another group. When the administrator configures a new AnyConnect release on the Cisco ASA, the IKEv2 users cannot download it automatically when they connect. What might be the problem?

A.

The XML profile is not configured correctly for the affected users.

B.

The new client image does not use the same major release as the current one.

C.

Client services are not enabled.

D.

Client software updates are not supported with IKEv2.

Full Access
Question # 14

Refer to the exhibit.

Based on the exhibit, why are users unable to access CCNP Webserver bookmark?

A.

The URL is being blocked by a WebACL.

B.

The ASA cannot resolve the URL.

C.

The bookmark has been disabled.

D.

The user cannot access the URL.

Full Access
Question # 15

Which requirement is needed to use local authentication for Cisco AnyConnect Secure Mobility Clients that connect to a FlexVPN server?

A.

use of certificates instead of username and password

B.

EAP-AnyConnect

C.

EAP query-identity

D.

AnyConnect profile

Full Access
Question # 16

In a FlexVPN deployment, the spokes successfully connect to the hub, but spoke-to-spoke tunnels do not form. Which troubleshooting step solves the issue?

A.

Verify the spoke configuration to check if the NHRP redirect is enabled.

B.

Verify that the spoke receives redirect messages and sends resolution requests.

C.

Verify the hub configuration to check if the NHRP shortcut is enabled.

D.

Verify that the tunnel interface is contained within a VRF.

Full Access
Question # 17

Refer to the exhibit.

What is a result of this configuration?

A.

Spoke 1 fails the authentication because the authentication methods are incorrect.

B.

Spoke 2 passes the authentication to the hub and successfully proceeds to phase 2.

C.

Spoke 2 fails the authentication because the remote authentication method is incorrect.

D.

Spoke 1 passes the authentication to the hub and successfully proceeds to phase 2.

Full Access
Question # 18

Refer to the exhibit.

Based on the debug output, which type of mismatch is preventing the VPN from coming up?

A.

interesting traffic

B.

lifetime

C.

preshared key

D.

PFS

Full Access
Question # 19

Refer to the exhibit.

The customer can establish a Cisco AnyConnect connection without using an XML profile. When the host "ikev2" is selected in the AnyConnect drop down, the connection fails. What is the cause of this issue?

A.

The HostName is incorrect.

B.

The IP address is incorrect.

C.

Primary protocol should be SSL.

D.

UserGroup must match connection profile.

Full Access
Question # 20

Refer to the exhibit.

A site-to-site tunnel between two sites is not coming up. Based on the debugs, what is the cause of this issue?

A.

An authentication failure occurs on the remote peer.

B.

A certificate fragmentation issue occurs between both sides.

C.

UDP 4500 traffic from the peer does not reach the router.

D.

An authentication failure occurs on the router.

Full Access
Question # 21

Refer to the exhibit.

The IKEv2 site-to-site VPN tunnel between two routers is down. Based on the debug output, which type of mismatch is the problem?

A.

preshared key

B.

peer identity

C.

transform set

D.

ikev2 proposal

Full Access
Question # 22

Where must an engineer configure a preshared key for a site-to-site VPN tunnel configured on a Cisco ASA?

A.

isakmp policy

B.

group policy

C.

crypto map

D.

tunnel group

Full Access
Question # 23

A network administrator is deploying a Cisco IPS appliance and needs it to operate initially without affecting traffic flows. It must also collect data to provide a baseline of unwanted traffic before being reconfigured to drop it. Which Cisco IPS mode meets these requirements?

A.

failsafe

B.

inline tap

C.

promiscuous

D.

bypass

Full Access
Question # 24

Which VPN technology minimizes the impact on VPN performance when encrypting multicast traffic on a Private WAN?

A.

DMVPN

B.

IPsec VPN

C.

FlexVPN

D.

GETVPN

Full Access
Question # 25

VPN tunnels between a spoke and two DMVPN hubs are not coming up. The network administrator has verified that the encryption, hashing, and DH group proposals for Phase 1 and Phase 2 match on both ends. What is the solution to this issue?

A.

Ensure bidirectional UDP 500/4500 traffic.

B.

Increase the isakmp phase 1 lifetime.

C.

Add NAT statements for VPN traffic.

D.

Enable shared tunnel protection.

Full Access
Question # 26

Refer to the exhibit.

Users cannot connect via AnyConnect SSLVPN. Which action resolves this issue?

A.

Configure the ASA to act as a DHCP server.

B.

Configure the HTTP server to listen on port 443.

C.

Add an IPsec preshared key to the group policy.

D.

Add ssl-client to the allowed list of VPN protocols.

Full Access
Question # 27

An administrator must guarantee that remote access users are able to reach printers on their local LAN after a VPN session is established to the headquarters. All other traffic should be sent over the tunnel. Which split-tunnel policy reduces the configuration on the ASA headend?

A.

include specified

B.

exclude specified

C.

tunnel specified

D.

dynamic exclude

Full Access
Question # 28

What is a characteristic of GETVPN?

A.

An ACL that defines interesting traffic must be configured and applied to the crypto map.

B.

Quick mode is used to create an IPsec SA.

C.

The remote peer for the IPsec session is configured as part of the crypto map.

D.

All peers have one IPsec SPI for inbound and outbound communication.

Full Access
Question # 29

Refer to the exhibit.

A user is connecting from behind a PC with a private IP Address. Their ISP provider is blocking TCP port 443. Which AnyConnect XML configuration will allow the user to establish a connection with the ASA?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 30

After a user configures a connection profile with a bookmark list and tests the clientless SSLVPN connection, all of the bookmarks are grayed out. What must be done to correct this behavior?

A.

Apply the bookmark to the correct group policy.

B.

Specify the correct port for the web server under the bookmark.

C.

Configure a DNS server on the Cisco ASA and verify it has a record for the web server.

D.

Verify HTTP/HTTPS connectivity between the Cisco ASA and the web server.

Full Access
Question # 31

Which DMVPN feature allows spokes to be deployed with dynamically assigned public IP addresses?

A.

2547oDMVPN

B.

NHRP

C.

OSPF

D.

NAT Traversal

Full Access
Question # 32

A network administrator wants to block traffic to a known malware site at https:/www.badsite.com and all subdomains while ensuring no packets from any internal client are sent to that site. Which type of policy must the network administrator use to accomplish this goal?

A.

Access Control policy with URL filtering

B.

Prefilter policy

C.

DNS policy

D.

SSL policy

Full Access
Question # 33

Which two remote access VPN solutions support SSL? (Choose two.)

A.

FlexVPN

B.

clientless

C.

EZVPN

D.

L2TP

E.

Cisco AnyConnect

Full Access
Question # 34

Which VPN does VPN load balancing on the ASA support?

A.

VTI

B.

IPsec site-to-site tunnels

C.

L2TP over IPsec

D.

Cisco AnyConnect

Full Access
Question # 35

Refer to the exhibit.

Which VPN technology is used in the exhibit?

A.

DVTI

B.

VTI

C.

DMVPN

D.

GRE

Full Access
Question # 36

Which parameter must match on all routers in a DMVPN Phase 3 cloud?

A.

GRE tunnel key

B.

NHRP network ID

C.

tunnel VRF

D.

EIGRP split-horizon setting

Full Access
Question # 37

What are two functions of ECDH and ECDSA? (Choose two.)

A.

nonrepudiation

B.

revocation

C.

digital signature

D.

key exchange

E.

encryption

Full Access
Question # 38

Which feature of GETVPN is a limitation of DMVPN and FlexVPN?

A.

sequence numbers that enable scalable replay checking

B.

enabled use of ESP or AH

C.

design for use over public or private WAN

D.

no requirement for an overlay routing protocol

Full Access
Question # 39

Where is split tunneling defined for IKEv2 remote access clients on a Cisco router?

A.

IKEv2 authorization policy

B.

Group Policy

C.

virtual template

D.

webvpn context

Full Access
Question # 40

Which technology works with IPsec stateful failover?

A.

GLBR

B.

HSRP

C.

GRE

D.

VRRP

Full Access
Question # 41

Refer to the exhibit.

All internal clients behind the ASA are port address translated to the public outside interface that has an IP address of 3.3.3.3. Client 1 and client 2 have established successful SSL VPN connections to the ASA. What must be implemented so that "3.3.3.3" is returned from a browser search on the IP address?

A.

Same-security-traffic permit inter-interface under Group Policy

B.

Exclude Network List Below under Group Policy

C.

Tunnel All Networks under Group Policy

D.

Tunnel Network List Below under Group Policy

Full Access
Question # 42

Which benefit of FlexVPN is a limitation of DMVPN using IKEv1?

A.

GRE encapsulation allows for forwarding of non-IP traffic.

B.

IKE implementation can install routes in routing table.

C.

NHRP authentication provides enhanced security.

D.

Dynamic routing protocols can be configured.

Full Access
Question # 43

Which two commands help determine why the NHRP registration process is not being completed even after the IPsec tunnel is up? (Choose two.)

A.

show crypto isakmp sa

B.

show ip traffic

C.

show crypto ipsec sa

D.

show ip nhrp traffic

E.

show dmvpn detail

Full Access
Question # 44

Refer to the exhibit.

A customer cannot establish an IKEv2 site-to-site VPN tunnel between two Cisco ASA devices. Based on the syslog message, which action brings up the VPN tunnel?

A.

Reduce the maximum SA limit on the local Cisco ASA.

B.

Increase the maximum in-negotiation SA limit on the local Cisco ASA.

C.

Remove the maximum SA limit on the remote Cisco ASA.

D.

Correct the crypto access list on both Cisco ASA devices.

Full Access
Question # 45

A second set of traffic selectors is negotiated between two peers using IKEv2. Which IKEv2 packet will contain details of the exchange?

A.

IKEv2 IKE_SA_INIT

B.

IKEv2 INFORMATIONAL

C.

IKEv2 CREATE_CHILD_SA

D.

IKEv2 IKE_AUTH

Full Access
Question # 46

Refer to the exhibit.

Which two tunnel types produce the show crypto ipsec sa output seen in the exhibit? (Choose two.)

A.

crypto map

B.

DMVPN

C.

GRE

D.

FlexVPN

E.

VTI

Full Access
Question # 47

Which two changes must be made in order to migrate from DMVPN Phase 2 to Phase 3 when EIGRP is configured? (Choose two.)

A.

Add NHRP shortcuts on the hub.

B.

Add NHRP redirects on the spoke.

C.

Disable EIGRP next-hop-self on the hub.

D.

Enable EIGRP next-hop-self on the hub.

E.

Add NHRP redirects on the hub.

Full Access
Question # 48

Which method dynamically installs the network routes for remote tunnel endpoints?

A.

policy-based routing

B.

CEF

C.

reverse route injection

D.

route filtering

Full Access
Question # 49

Which two parameters help to map a VPN session to a tunnel group without using the tunnel-group list? (Choose two.)

A.

group-alias

B.

certificate map

C.

optimal gateway selection

D.

group-url

E.

AnyConnect client version

Full Access
Question # 50

Drag and drop the correct commands from the night onto the blanks within the code on the left to implement a design that allow for dynamic spoke-to-spoke communication. Not all comments are used.

Full Access
Question # 51

On a FlexVPN hub-and-spoke topology where spoke-to-spoke tunnels are not allowed, which command is needed for the hub to be able to terminate FlexVPN tunnels?

A.

interface virtual-access

B.

ip nhrp redirect

C.

interface tunnel

D.

interface virtual-template

Full Access