Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A Cisco AnyConnect client establishes a SSL VPN connection with an ASA at the corporate office. An engineer must ensure that the client computer meets the enterprise security policy. Which feature can update the client to meet an enterprise security policy?

A.

Endpoint Assessment

B.

Cisco Secure Desktop

C.

Basic Host Scan

D.

Advanced Endpoint Assessment

Full Access
Question # 5

Refer to the exhibit.

Which value must be configured in the User Group field when the Cisco AnyConnect Profile is created to connect to an ASA headend with IPsec as the primary protocol?

A.

address-pool

B.

group-alias

C.

group-policy

D.

tunnel-group

Full Access
Question # 6

Which two types of web resources or protocols are enabled by default on the Cisco ASA Clientless SSL VPN portal? (Choose two.)

A.

HTTP

B.

ICA (Citrix)

C.

VNC

D.

RDP

E.

CIFS

Full Access
Question # 7

Which two statements about the Cisco ASA Clientless SSL VPN solution are true? (Choose two.)

A.

When a client connects to the Cisco ASA WebVPN portal and tries to access HTTP resources through the URL bar, the client uses the local DNS to perform FQDN resolution.

B.

The rewriter enable command under the global webvpn configuration enables the rewriter functionality because that feature is disabled by default.

C.

A Cisco ASA can simultaneously allow Clientless SSL VPN sessions and AnyConnect client sessions.

D.

When a client connects to the Cisco ASA WebVPN portal and tries to access HTTP resources through the URL bar, the ASA uses its configured DNS servers to perform FQDN resolution.

E.

Clientless SSLVPN provides Layer 3 connectivity into the secured network.

Full Access
Question # 8

Which feature allows the ASA to handle nonstandard applications and web resources so that they display correctly over a clientless SSL VPN connection?

A.

single sign-on

B.

Smart Tunnel

C.

WebType ACL

D.

plug-ins

Full Access
Question # 9

Refer to the exhibit.

A site-to-site tunnel between two sites is not coming up. Based on the debugs, what is the cause of this issue?

A.

An authentication failure occurs on the remote peer.

B.

A certificate fragmentation issue occurs between both sides.

C.

UDP 4500 traffic from the peer does not reach the router.

D.

An authentication failure occurs on the router.

Full Access
Question # 10

Refer to the exhibit.

An engineer is troubleshooting a new GRE over IPsec tunnel. The tunnel is established but the engineer cannot ping from spoke 1 to spoke 2. Which type of traffic is being blocked?

A.

ESP packets from spoke2 to spoke1

B.

ISAKMP packets from spoke2 to spoke1

C.

ESP packets from spoke1 to spoke2

D.

ISAKMP packets from spoke1 to spoke2

Full Access
Question # 11

Refer to the exhibit.

The customer can establish a Cisco AnyConnect connection without using an XML profile. When the host "ikev2" is selected in the AnyConnect drop down, the connection fails. What is the cause of this issue?

A.

The HostName is incorrect.

B.

The IP address is incorrect.

C.

Primary protocol should be SSL.

D.

UserGroup must match connection profile.

Full Access
Question # 12

Refer to the exhibit.

Which type of mismatch is causing the problem with the IPsec VPN tunnel?

A.

crypto access list

B.

Phase 1 policy

C.

transform set

D.

preshared key

Full Access
Question # 13

Refer to the exhibit.

What is a result of this configuration?

A.

Spoke 1 fails the authentication because the authentication methods are incorrect.

B.

Spoke 2 passes the authentication to the hub and successfully proceeds to phase 2.

C.

Spoke 2 fails the authentication because the remote authentication method is incorrect.

D.

Spoke 1 passes the authentication to the hub and successfully proceeds to phase 2.

Full Access
Question # 14

An engineer is troubleshooting a new DMVPN setup on a Cisco IOS router. After the show crypto isakmp sa command is issued, a response is returned of "MM_NO_STATE." Why does this failure occur?

A.

The ISAKMP policy priority values are invalid.

B.

ESP traffic is being dropped.

C.

The Phase 1 policy does not match on both devices.

D.

Tunnel protection is not applied to the DMVPN tunnel.

Full Access
Question # 15

Refer to the exhibit.

Based on the debug output, which type of mismatch is preventing the VPN from coming up?

A.

interesting traffic

B.

lifetime

C.

preshared key

D.

PFS

Full Access
Question # 16

Refer to the exhibit.

The IKEv2 site-to-site VPN tunnel between two routers is down. Based on the debug output, which type of mismatch is the problem?

A.

preshared key

B.

peer identity

C.

transform set

D.

ikev2 proposal

Full Access
Question # 17

Refer to the exhibit.

Which two commands under the tunnel-group webvpn-attributes result in a Cisco AnyConnect user receiving the AnyConnect prompt in the exhibit? (Choose two.)

A.

group-url https://172.16.31.10/General enable

B.

group-policy General internal

C.

authentication aaa

D.

authentication certificate

E.

group-alias General enable

Full Access
Question # 18

Cisco AnyConnect Secure Mobility Client has been configured to use IKEv2 for one group of users and SSL for another group. When the administrator configures a new AnyConnect release on the Cisco ASA, the IKEv2 users cannot download it automatically when they connect. What might be the problem?

A.

The XML profile is not configured correctly for the affected users.

B.

The new client image does not use the same major release as the current one.

C.

Client services are not enabled.

D.

Client software updates are not supported with IKEv2.

Full Access
Question # 19

Refer to the exhibit.

Based on the exhibit, why are users unable to access CCNP Webserver bookmark?

A.

The URL is being blocked by a WebACL.

B.

The ASA cannot resolve the URL.

C.

The bookmark has been disabled.

D.

The user cannot access the URL.

Full Access
Question # 20

Which command identifies a Cisco AnyConnect profile that was uploaded to the flash of an IOS router?

A.

svc import profile SSL_profile flash:simos-profile.xml

B.

anyconnect profile SSL_profile flash:simos-profile.xml

C.

crypto vpn anyconnect profile SSL_profile flash:simos-profile.xml

D.

webvpn import profile SSL_profile flash:simos-profile.xml

Full Access
Question # 21

Under which section must a bookmark or URL list be configured on a Cisco ASA to be available for clientless SSLVPN users?

A.

tunnel-group (general-attributes)

B.

tunnel-group (webvpn-attributes)

C.

webvpn (group-policy)

D.

webvpn (global configuration)

Full Access
Question # 22

Which parameter must match on all routers in a DMVPN Phase 3 cloud?

A.

GRE tunnel key

B.

NHRP network ID

C.

tunnel VRF

D.

EIGRP split-horizon setting

Full Access
Question # 23

A Cisco ASA is configured in active/standby mode. What is needed to ensure that Cisco AnyConnect users can connect after a failover event?

A.

AnyConnect images must be uploaded to both failover ASA devices.

B.

The vpnsession-db must be cleared manually.

C.

Configure a backup server in the XML profile.

D.

AnyConnect client must point to the standby IP address.

Full Access
Question # 24

Which technology is used to send multicast traffic over a site-to-site VPN?

A.

GRE over IPsec on IOS router

B.

GRE over IPsec on FTD

C.

IPsec tunnel on FTD

D.

GRE tunnel on ASA

Full Access
Question # 25

Which benefit of FlexVPN is a limitation of DMVPN using IKEv1?

A.

GRE encapsulation allows for forwarding of non-IP traffic.

B.

IKE implementation can install routes in routing table.

C.

NHRP authentication provides enhanced security.

D.

Dynamic routing protocols can be configured.

Full Access
Question # 26

What is a requirement for smart tunnels to function properly?

A.

Java or ActiveX must be enabled on the client machine.

B.

Applications must be UDP.

C.

Stateful failover must not be configured.

D.

The user on the client machine must have admin access.

Full Access
Question # 27

Which two remote access VPN solutions support SSL? (Choose two.)

A.

FlexVPN

B.

clientless

C.

EZVPN

D.

L2TP

E.

Cisco AnyConnect

Full Access
Question # 28

Where is split tunneling defined for IKEv2 remote access clients on a Cisco router?

A.

IKEv2 authorization policy

B.

Group Policy

C.

virtual template

D.

webvpn context

Full Access
Question # 29

Cisco AnyConnect clients need to transfer large files over the VPN sessions. Which protocol provides the best throughput?

A.

SSL/TLS

B.

L2TP

C.

DTLS

D.

IPsec IKEv1

Full Access
Question # 30

Refer to the exhibit.

Which VPN technology is used in the exhibit?

A.

DVTI

B.

VTI

C.

DMVPN

D.

GRE

Full Access
Question # 31

Which parameter is initially used to elect the primary key server from a group of key servers?

A.

code version

B.

highest IP address

C.

highest-priority value

D.

lowest IP address

Full Access
Question # 32

What uses an Elliptic Curve key exchange algorithm?

A.

ECDSA

B.

ECDHE

C.

AES-GCM

D.

SHA

Full Access
Question # 33

On a FlexVPN hub-and-spoke topology where spoke-to-spoke tunnels are not allowed, which command is needed for the hub to be able to terminate FlexVPN tunnels?

A.

interface virtual-access

B.

ip nhrp redirect

C.

interface tunnel

D.

interface virtual-template

Full Access
Question # 34

Drag and drop the correct commands from the night onto the blanks within the code on the left to implement a design that allow for dynamic spoke-to-spoke communication. Not all comments are used.

Full Access
Question # 35

Which statement about GETVPN is true?

A.

The configuration that defines which traffic to encrypt originates from the key server.

B.

TEK rekeys can be load-balanced between two key servers operating in COOP.

C.

The pseudotime that is used for replay checking is synchronized via NTP.

D.

Group members must acknowledge all KEK and TEK rekeys, regardless of configuration.

Full Access
Question # 36

Refer to the exhibit.

Which two tunnel types produce the show crypto ipsec sa output seen in the exhibit? (Choose two.)

A.

crypto map

B.

DMVPN

C.

GRE

D.

FlexVPN

E.

VTI

Full Access
Question # 37

Refer to the exhibit.

A customer cannot establish an IKEv2 site-to-site VPN tunnel between two Cisco ASA devices. Based on the syslog message, which action brings up the VPN tunnel?

A.

Reduce the maximum SA limit on the local Cisco ASA.

B.

Increase the maximum in-negotiation SA limit on the local Cisco ASA.

C.

Remove the maximum SA limit on the remote Cisco ASA.

D.

Correct the crypto access list on both Cisco ASA devices.

Full Access
Question # 38

Which method dynamically installs the network routes for remote tunnel endpoints?

A.

policy-based routing

B.

CEF

C.

reverse route injection

D.

route filtering

Full Access
Question # 39

A second set of traffic selectors is negotiated between two peers using IKEv2. Which IKEv2 packet will contain details of the exchange?

A.

IKEv2 IKE_SA_INIT

B.

IKEv2 INFORMATIONAL

C.

IKEv2 CREATE_CHILD_SA

D.

IKEv2 IKE_AUTH

Full Access
Question # 40

Which two changes must be made in order to migrate from DMVPN Phase 2 to Phase 3 when EIGRP is configured? (Choose two.)

A.

Add NHRP shortcuts on the hub.

B.

Add NHRP redirects on the spoke.

C.

Disable EIGRP next-hop-self on the hub.

D.

Enable EIGRP next-hop-self on the hub.

E.

Add NHRP redirects on the hub.

Full Access
Question # 41

Which two parameters help to map a VPN session to a tunnel group without using the tunnel-group list? (Choose two.)

A.

group-alias

B.

certificate map

C.

optimal gateway selection

D.

group-url

E.

AnyConnect client version

Full Access
Question # 42

Refer to the exhibit.

The DMVPN tunnel is dropping randomly and no tunnel protection is configured. Which spoke configuration mitigates tunnel drops?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 43

Refer to the exhibit.

A network administrator is setting up a phone VPN on a Cisco ASA. The phone cannot connect and the error is presented in a debug on the Cisco ASA. Which action fixes this issue?

A.

Enable web-deploy of the posture module so that the module can be downloaded from the Cisco ASA to an IP phone.

B.

Configure the Cisco ASA to present an RSA certificate to the phone for authentication.

C.

Disable Cisco Secure Desktop under the connection profile VPNPhone.

D.

Install the posture module on the Cisco ASA.

Full Access