Get Full Version of the Exam
http://www.EnsurePass.com/300-209.html
Question No.31
Which option describes the purpose of the command show derived-config interface virtual- access 1?
-
It verifies that the virtual access interface is cloned correctly with per-user attributes.
-
It verifies that the virtual template created the tunnel interface.
-
It verifies that the virtual access interface is of type Ethernet.
-
It verifies that the virtual access interface is used to create the tunnel interface.
Correct Answer: A
Question No.32
Which hash algorithm is required to protect classified information?
-
MD5
-
SHA-1
-
SHA-256
-
SHA-384
Correct Answer: D
Question No.33
Refer to the exhibit. Which two characteristics of the VPN implementation are evident? (Choose two.)
-
dual DMVPN cloud setup with dual hub
-
DMVPN Phase 3 implementation
-
single DMVPN cloud setup with dual hub
-
DMVPN Phase 1 implementation
-
quad DMVPN cloud with quadra hub
-
DMVPN Phase 2 implementation
Correct Answer: BC
Question No.34
If Web VPN bookmarks are grayed out on the home screen, which action should you take to begin troubleshooting?
-
Determine whether the Cisco ASA can resolve the DNS names.
-
Determine whether the Cisco ASA has DNS forwarders set up.
-
Determine whether an ACL is present to permit DNS forwarding.
-
Replace the DNS name with an IP address.
Correct Answer: A
Question No.35
Which option is a possible solution if you cannot access a URL through clientless SSL VPN with Internet Explorer, while other browsers work fine?
-
Verify the trusted zone and cookies settings in your browser.
-
Make sure that you specified the URL correctly.
-
Try the URL from another operating system.
-
Move to the IPsec client.
Correct Answer: A
Question No.36
Which statement regarding GET VPN is true?
-
TEK rekeys can be load-balanced between two key servers operating in COOP.
-
When you implement GET VPN with VRFs, all VRFs must be defined in the GDOI group configuration on the key server.
-
Group members must acknowledge all KEK and TEK rekeys, regardless of configuration.
-
The configuration that defines which traffic to encrypt is present only on the key server.
-
The pseudotime that is used for replay checking is synchronized via NTP.
Correct Answer: D
Question No.37
What must be enabled in the web browser of the client computer to support Clientless SSL VPN?
-
cookies
-
ActiveX
-
Silverlight
-
popups
Correct Answer: A
Question No.38
Refer to the exhibit. After the configuration is performed, which combination of devices can connect?
-
a device with an identity type of IPv4 address of 209.165.200.225 or 209.165.202.155 or a certificate with subject name of quot;cisco.comquot;
-
a device with an identity type of IPv4 address of both 209.165.200.225 and 209.165.202.155 or a certificate with subject name containing quot;cisco.comquot;
-
a device with an identity type of IPv4 address of both 209.165.200.225 and 209.165.202.155 and a certificate with subject name containing quot;cisco.comquot;
-
a device with an identity type of IPv4 address of 209.165.200.225 or 209.165.202.155 or a certificate with subject name containing quot;cisco.comquot;
Correct Answer: D
Question No.39
When you configure IPsec VPN High Availability Enhancements, which technology does Cisco recommend that you enable to make reconvergence faster?
-
EOT
-
IP SLAs
-
periodic IKE keepalives
-
VPN fast detection
Correct Answer: C
Question No.40
When troubleshooting established clientless SSL VPN issues, which three steps should be taken? (Choose three.)
-
Clear the browser history.
-
Clear the browser and Java cache.
-
Collect the information from the computer event log.
-
Enable and use HTML capture tools.
-
Gather crypto debugs on the adaptive security appliance.
-
Use Wireshark to capture network traffic.
Correct Answer: BEF
Get Full Version of the Exam
300-209 Dumps
300-209 VCE and PDF