[Free] 2017(Apr) Ensurepass Braindumps Cisco 300-209 Latest Dumps 31-40

Ensurepass
2017 April Cisco Official New Released 300-209 Q&As
100% Free Download! 100% Pass Guaranteed!
http://www.ensurepass.com/300-209.html

Implementing Cisco Secure Mobility Solutions (SIMOS)

QUESTION 31

Which option describes the purpose of the command show derived-config interface virtual- access 1?

 

A.

It verifies that the virtual access interface is cloned correctly with per-user attributes.

B.

It verifies that the virtual template created the tunnel interface.

C.

It verifies that the virtual access interface is of type Ethernet.

D.

It verifies that the virtual access interface is used to create the tunnel interface.

 

Correct Answer: A

 

 

QUESTION 32

Which hash algorithm is required to protect classified information?

 

A.

MD5

B.

SHA-1

C.

SHA-256

D.

SHA-384

 

Correct Answer: D

 

 

 

 

 

 

 

 

QUESTION 33

Refer to the exhibit. Which two characteristics of the VPN implementation are evident? (Choose two.)

 

clip_image001

 

A.

dual DMVPN cloud setup with dual hub

B.

DMVPN Phase 3 implementation

C.

single DMVPN cloud setup with dual hub

D.

DMVPN Phase 1 implementation

E.

quad DMVPN cloud with quadra hub

F.

DMVPN Phase 2 implementation

 

Correct Answer: BC

 

 

QUESTION 34

If Web VPN bookmarks are grayed out on the home screen, which action should you take to begin troubleshooting?

 

A.

Determine whether the Cisco ASA can resolve the DNS names.

B.

Determine whether the Cisco ASA has DNS forwarders set up.

C.

Determine whether an ACL is present to permit DNS forwarding.

D.

Replace the DNS name with an IP address.

 

Correct Answer: A

 

 

QUESTION 35

Which option is a possible solution if you cannot access a URL through clientless SSL VPN with Internet Explorer, while other browsers work fine?

 

A.

Verify the trusted zone and cookies settings in your browser.

B.

Make sure that you specified the URL correctly.

C.

Try the URL from another operating system.

D.

Move to the IPsec client.

 

Correct Answer: A

 

 

QUESTION 36

Which statement regarding GET VPN is true?

 

A.

TEK rekeys can be load-balanced between two key servers operating in COOP.

B.

When you implement GET VPN with VRFs, all VRFs must be defined in the GDOI group configuration on the key server.

C.

Group members must acknowledge all KEK and TEK rekeys, regardless of configuration.

D.

The configuration that defines which traffic to encrypt is present only on the key server.

E.

The pseudotime that is used for replay checking is synchronized via NTP.

 

Correct Answer: D

 

 

QUESTION 37

What must be enabled in the web browser of the client computer to support Clientless SSL VPN?

 

A.

cookies

B.

ActiveX

C.

Silverlight

D.

popups

 

Correct Answer: A

 

 

QUESTION 38

Refer to the exhibit. After the configuration is performed, which combination of devices can connect?

 

clip_image002

 

A.

a device with an identity type of IPv4 address of 209.165.200.225 or 209.165.202.155 or a certificate with subject name of “cisco.com”

B.

a device with an identity type of IPv4 address of both 209.165.200.225 and 209.165.202.155 or a certificate with subject name containing “cisco.com”

C.

a device with an identity type of IPv4 address of both 209.165.200.225 and 209.165.202.155 and a certificate with subject name containing “cisco.com”

D.

a device with an identity type of IPv4 address of 209.165.200.225 or 209.165.202.155 or a certificate with subject name containing “cisco.com”

 

Correct Answer: D

 

 

QUESTION 39

When you configure IPsec VPN High Availability Enhancements, which technology does Cisco recommend that you enable to make reconvergence faster?

 

A.

EOT

B.

IP SLAs

C.

periodic IKE keepalives

D.

VPN fast detection

 

Correct Answer: C

 

 

QUESTION 40

When troubleshooting established clientless SSL VPN issues, which three steps should be taken? (Choose three.)

 

A.

Clear the browser history.

B.

Clear the browser and Java cache.

C.

Collect the information from the computer event log.

D.

Enable and use HTML capture tools.

E.

Gather crypto debugs on the adaptive security appliance.

F.

Use Wireshark to capture network traffic.

 

Correct Answer: BEF

100% Free Download!
—Download Free Demo:300-209 Demo PDF
100% Pass Guaranteed!
Download 2017 Ensurepass 300-209 Full Exam PDF and VCE Q&As:267
—Get 10% off your purchase! Copy it:8GTC-8UIE-M1SC [2017.04.01-2017.04.30]

Ensurepass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF + VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Ensurepass IT Certification PDF and VCE

HOT EXAM!
Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com