Download Implementing Cisco Secure Mobility Solutions.passit4sure.300-209.2018-10-25.1e.195q.vcex


Download Exam

File Info

Exam Implementing Cisco Secure Mobility Solutions
Number 300-209
File Name Implementing Cisco Secure Mobility Solutions.passit4sure.300-209.2018-10-25.1e.195q.vcex
Size 34.21 Mb
Posted October 25, 2018
Downloads 29



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%


 
 



Demo Questions

Question 1
A Cisco router may have a fan issue that could increase its temperature and trigger a failure. What troubleshooting steps would verify the issue without causing additional risks?

  • A: Configure logging using commands "logging on", "logging buffered 4", and check for fan failure logs using "show logging"
  • B: Configure logging using commands "logging on", "logging buffered 6", and check for fan failure logs using "show logging"
  • C: Configure logging using commands "logging on", "logging discriminator msglog1 console 7", and check for fan failure logs using "show logging"
  • D: Configure logging using commands "logging host 10.11.10.11", "logging trap 2", and check for fan failure logs at the syslog server 10.11.10.11



Question 2
An internet-based VPN solution is being considered to replace an existing private WAN connecting remote offices. A multimedia application is used that relies on multicast for communication.  Which two VPN solutions meet the application's network requirement? (Choose two.)

  • A: FlexVPN
  • B: DMVPN
  • C: Group Encrypted Transport VPN
  • D: Crypto-map based Site-to-Site IPsec VPNs
  • E: AnyConnect VPN



Question 3
A private wan connection is suspected of intermittently corrupting data. Which technology can a network administrator use to detect and drop the altered data traffic?

  • A: AES-128
  • B: RSA Certificates
  • C: SHA2-HMAC
  • D: 3DES
  • E: Diffie-Helman Key Generation



Question 4
A company needs to provide secure access to its remote workforce. The end users use public kiosk computers and a wide range of devices. 
They will be accessing only an internal web application. Which VPN solution satisfies these requirements?

  • A: Clientless SSLVPN
  • B: AnyConnect Client using SSLVPN
  • C: AnyConnect Client using IKEv2
  • D: FlexVPN Client
  • E: Windows built-in PPTP client



Question 5
A network administrator is configuring AES encryption for the ISAKMP policy on an IOS router. Which two configurations are valid? (Choose two.)

  • A: crypto isakmp policy 10 
    encryption aes 254
  • B: crypto isakmp policy 10 
    encryption aes 192
  • C: crypto isakmp policy 10 
    encryption aes 256
  • D: crypto isakmp policy 10 
    encryption aes 196
  • E: crypto isakmp policy 10 
    encryption aes 198
  • F: crypto isakmp policy 10 
    encryption aes 64



Question 6
Which two qualify as Next Generation Encryption integrity algorithms? (Choose two.)

  • A: SHA-512
  • B: SHA-256
  • C: SHA-192
  • D: SHA-380
  • E: SHA-192
  • F: SHA-196



Question 7
Which statement is true when implementing a router with a dynamic public IP address in a crypto map based site-to-site VPN?

  • A: The router must be configured with a dynamic crypto map.
  • B: Certificates are always used for phase 1 authentication.
  • C: The tunnel establishment will fail if the router is configured as a responder only.
  • D: The router and the peer router must have NAT traversal enabled.



Question 8
Which two statements are true when designing a SSL VPN solution using Cisco AnyConnect? (Choose two.)

  • A: The VPN server must have a self-signed certificate.
  • B: A SSL group pre-shared key must be configured on the server.
  • C: Server side certificate is optional if using AAA for client authentication.
  • D: The VPN IP address pool can overlap with the rest of the LAN networks.
  • E: DTLS can be enabled for better performance.



Question 9
Which two features are required when configuring a DMVPN network? (Choose two.)

  • A: Dynamic routing protocol
  • B: GRE tunnel interface
  • C: Next Hop Resolution Protocol
  • D: Dynamic crypto map
  • E: IPsec encryption



Question 10
What are two benefits of DMVPN Phase 3? (Choose two.)

  • A: Administrators can use summarization of routing protocol updates from hub to spokes.
  • B: It introduces hierarchical DMVPN deployments.
  • C: It introduces non-hierarchical DMVPN deployments.
  • D: It supports L2TP over IPSec as one of the VPN protocols.









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset