Download Cisco.PracticeDumps.300-209.2018-02-09.1e.314q.vcex

Download Exam

File Info

Exam Implementing Cisco Secure Mobility Solutions
Number 300-209
File Name Cisco.PracticeDumps.300-209.2018-02-09.1e.314q.vcex
Size 43.11 Mb
Posted February 09, 2018
Downloads 121
Download Cisco.PracticeDumps.300-209.2018-02-09.1e.314q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



 
 



Demo Questions

Question 1

Which two are characteristics of GETVPN? (Choose two.)

  • A: The IP header of the encrypted packet is preserved
  • B: A key server is elected among all configured Group Members
  • C: Unique encryption keys are computed for each Group Member
  • D: The same key encryption and traffic encryption keys are distributed to all Group Members

Correct Answer: AD




Question 2

A company has decided to migrate an existing IKEv1 VPN tunnel to IKEv2. Which two are valid configuration constructs on a Cisco IOS router? (Choose two.)

  • A: crypto ikev2 keyring keyring-name 
    peer peer1 
      address 209.165.201.1 255.255.255.255 
      pre-shared-key local key1 
      pre-shared-key remote key2
  • B: crypto ikev2 transform-set transform-set-name 
      esp-3des esp-md5-hmac 
      esp-aes esp-sha-hmac
  • C: crypto ikev2 map crypto-map-name 
    set crypto ikev2 tunnel-group tunnel-group-name 
    set crypto ikev2 transform-set transform-set-name
  • D: crypto ikev2 tunnel-group tunnel-group-name 
    match identity remote address 209.165.201.1 
    authentication local pre-share 
    authentication remote pre-share
  • E: crypto ikev2 profile profile-name 
    match identity remote address 209.165.201.1 
    authentication local pre-share 
    authentication remote pre-share

Correct Answer: AE




Question 3

Which four activities does the Key Server perform in a GETVPN deployment? (Choose four.)

  • A: authenticates group members
  • B: manages security policy
  • C: creates group keys
  • D: distributes policy/keys
  • E: encrypts endpoint traffic
  • F: receives policy/keys
  • G: defines group members

Correct Answer: ABCD




Question 4

Where is split-tunneling defined for remote access clients on an ASA?

  • A: Group-policy
  • B: Tunnel-group
  • C: Crypto-map
  • D: Web-VPN Portal
  • E: ISAKMP client

Correct Answer: A




Question 5

Which of the following could be used to configure remote access VPN Host-scan and pre-login policies?

  • A: ASDM
  • B: Connection-profile CLI command
  • C: Host-scan CLI command under the VPN group policy
  • D: Pre-login-check CLI command

Correct Answer: A




Question 6

In FlexVPN, what command can an administrator use to create a virtual template interface that can be configured and applied dynamically to create virtual access interfaces?

  • A: interface virtual-template number type template
  • B: interface virtual-template number type tunnel
  • C: interface template number type virtual
  • D: interface tunnel-template number

Correct Answer: B

Here is a reference an explanation that can be included with this test. 
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/15-2mt/sec-flex-spoke.html#GUID-4A10927D-4C6A-4202-B01C-DA7E462F5D8A
Configuring the Virtual Tunnel Interface on FlexVPN Spoke 
SUMMARY STEPS 
enable 
configure terminal 
interface virtual-template number type tunnel 
ip unnumbered tunnel number 
ip nhrp network-id number 
ip nhrp shortcut virtual-template-number 
ip nhrp redirect [timeout seconds] 
exit




Question 7

In FlexVPN, what is the role of a NHRP resolution request?

  • A: It allows these entities to directly communicate without requiring traffic to use an intermediate hop
  • B: It dynamically assigns VPN users to a group
  • C: It blocks these entities from to directly communicating with each other
  • D: It makes sure that each VPN spoke directly communicates with the hub

Correct Answer: A




Question 8

What are three benefits of deploying a GET VPN? (Choose three.)

  • A: It provides highly scalable point-to-point topologies.
  • B: It allows replication of packets after encryption.
  • C: It is suited for enterprises running over a DMVPN network.
  • D: It preserves original source and destination IP address information.
  • E: It simplifies encryption management through use of group keying.
  • F: It supports non-IP protocols.

Correct Answer: BDE




Question 9

What is the default topology type for a GET VPN?

  • A: point-to-point
  • B: hub-and-spoke
  • C: full mesh
  • D: on-demand spoke-to-spoke

Correct Answer: C




Question 10

Which two GDOI encryption keys are used within a GET VPN network? (Choose two.)

  • A: key encryption key
  • B: group encryption key
  • C: user encryption key
  • D: traffic encryption key

Correct Answer: AD










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files