Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

300-730 Exam Dumps - Implementing Secure Solutions with Virtual Private Networks (SVPN)

Go to page:
Question # 17

What uses an Elliptic Curve key exchange algorithm?

A.

ECDSA

B.

ECDHE

C.

AES-GCM

D.

SHA

Full Access
Question # 18

On a FlexVPN hub-and-spoke topology where spoke-to-spoke tunnels are not allowed, which command is needed for the hub to be able to terminate FlexVPN tunnels?

A.

interface virtual-access

B.

ip nhrp redirect

C.

interface tunnel

D.

interface virtual-template

Full Access
Question # 19

Which method dynamically installs the network routes for remote tunnel endpoints?

A.

policy-based routing

B.

CEF

C.

reverse route injection

D.

route filtering

Full Access
Question # 20

Which statement about GETVPN is true?

A.

The configuration that defines which traffic to encrypt originates from the key server.

B.

TEK rekeys can be load-balanced between two key servers operating in COOP.

C.

The pseudotime that is used for replay checking is synchronized via NTP.

D.

Group members must acknowledge all KEK and TEK rekeys, regardless of configuration.

Full Access
Question # 21

A second set of traffic selectors is negotiated between two peers using IKEv2. Which IKEv2 packet will contain details of the exchange?

A.

IKEv2 IKE_SA_INIT

B.

IKEv2 INFORMATIONAL

C.

IKEv2 CREATE_CHILD_SA

D.

IKEv2 IKE_AUTH

Full Access
Question # 22

Which feature allows the ASA to handle nonstandard applications and web resources so that they display correctly over a clientless SSL VPN connection?

A.

single sign-on

B.

Smart Tunnel

C.

WebType ACL

D.

plug-ins

Full Access
Question # 23

Which two types of web resources or protocols are enabled by default on the Cisco ASA Clientless SSL VPN portal? (Choose two.)

A.

HTTP

B.

ICA (Citrix)

C.

VNC

D.

RDP

E.

CIFS

Full Access
Question # 24

Which configuration construct must be used in a FlexVPN tunnel?

A.

EAP configuration

B.

multipoint GRE tunnel interface

C.

IKEv1 policy

D.

IKEv2 profile

Full Access
Go to page: