Download Implementing Cisco Secure Mobility Solutions.passit4sure.300-209.2018-10-25.1e.195q.vcex

Download Exam

File Info

Exam Implementing Cisco Secure Mobility Solutions
Number 300-209
File Name Implementing Cisco Secure Mobility Solutions.passit4sure.300-209.2018-10-25.1e.195q.vcex
Size 34.21 Mb
Posted October 25, 2018
Downloads 167
Download Implementing Cisco Secure Mobility Solutions.passit4sure.300-209.2018-10-25.1e.195q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



 
 



Demo Questions

Question 1

A Cisco router may have a fan issue that could increase its temperature and trigger a failure. What troubleshooting steps would verify the issue without causing additional risks?

  • A: Configure logging using commands "logging on", "logging buffered 4", and check for fan failure logs using "show logging"
  • B: Configure logging using commands "logging on", "logging buffered 6", and check for fan failure logs using "show logging"
  • C: Configure logging using commands "logging on", "logging discriminator msglog1 console 7", and check for fan failure logs using "show logging"
  • D: Configure logging using commands "logging host 10.11.10.11", "logging trap 2", and check for fan failure logs at the syslog server 10.11.10.11

Correct Answer: A




Question 2

An internet-based VPN solution is being considered to replace an existing private WAN connecting remote offices. A multimedia application is used that relies on multicast for communication.  Which two VPN solutions meet the application's network requirement? (Choose two.)

  • A: FlexVPN
  • B: DMVPN
  • C: Group Encrypted Transport VPN
  • D: Crypto-map based Site-to-Site IPsec VPNs
  • E: AnyConnect VPN

Correct Answer: AB




Question 3

A private wan connection is suspected of intermittently corrupting data. Which technology can a network administrator use to detect and drop the altered data traffic?

  • A: AES-128
  • B: RSA Certificates
  • C: SHA2-HMAC
  • D: 3DES
  • E: Diffie-Helman Key Generation

Correct Answer: C




Question 4

A company needs to provide secure access to its remote workforce. The end users use public kiosk computers and a wide range of devices. 
They will be accessing only an internal web application. Which VPN solution satisfies these requirements?

  • A: Clientless SSLVPN
  • B: AnyConnect Client using SSLVPN
  • C: AnyConnect Client using IKEv2
  • D: FlexVPN Client
  • E: Windows built-in PPTP client

Correct Answer: A




Question 5

A network administrator is configuring AES encryption for the ISAKMP policy on an IOS router. Which two configurations are valid? (Choose two.)

  • A: crypto isakmp policy 10 
    encryption aes 254
  • B: crypto isakmp policy 10 
    encryption aes 192
  • C: crypto isakmp policy 10 
    encryption aes 256
  • D: crypto isakmp policy 10 
    encryption aes 196
  • E: crypto isakmp policy 10 
    encryption aes 198
  • F: crypto isakmp policy 10 
    encryption aes 64

Correct Answer: BC




Question 6

Which two qualify as Next Generation Encryption integrity algorithms? (Choose two.)

  • A: SHA-512
  • B: SHA-256
  • C: SHA-192
  • D: SHA-380
  • E: SHA-192
  • F: SHA-196

Correct Answer: AB




Question 7

Which statement is true when implementing a router with a dynamic public IP address in a crypto map based site-to-site VPN?

  • A: The router must be configured with a dynamic crypto map.
  • B: Certificates are always used for phase 1 authentication.
  • C: The tunnel establishment will fail if the router is configured as a responder only.
  • D: The router and the peer router must have NAT traversal enabled.

Correct Answer: C




Question 8

Which two statements are true when designing a SSL VPN solution using Cisco AnyConnect? (Choose two.)

  • A: The VPN server must have a self-signed certificate.
  • B: A SSL group pre-shared key must be configured on the server.
  • C: Server side certificate is optional if using AAA for client authentication.
  • D: The VPN IP address pool can overlap with the rest of the LAN networks.
  • E: DTLS can be enabled for better performance.

Correct Answer: DE




Question 9

Which two features are required when configuring a DMVPN network? (Choose two.)

  • A: Dynamic routing protocol
  • B: GRE tunnel interface
  • C: Next Hop Resolution Protocol
  • D: Dynamic crypto map
  • E: IPsec encryption

Correct Answer: BC




Question 10

What are two benefits of DMVPN Phase 3? (Choose two.)

  • A: Administrators can use summarization of routing protocol updates from hub to spokes.
  • B: It introduces hierarchical DMVPN deployments.
  • C: It introduces non-hierarchical DMVPN deployments.
  • D: It supports L2TP over IPSec as one of the VPN protocols.

Correct Answer: AB










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files