aiotestking uk

300-209 Exam Questions - Online Test


300-209 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which Cisco adaptive security appliance command can be used to view the count of all active VPN sessions? 

A. show vpn-sessiondb summary 

B. show crypto ikev1 sa 

C. show vpn-sessiondb ratio encryption 

D. show iskamp sa detail 

E. show crypto protocol statistics all 

Answer:

Q2. What are two variables for configuring clientless SSL VPN single sign-on? (Choose two.) 

A. CSCO_WEBVPN_OTP_PASSWORD 

B. CSCO_WEBVPN_INTERNAL_PASSWORD 

C. CSCO_WEBVPN_USERNAME 

D. CSCO_WEBVPN_RADIUS_USER 

Answer: B,C 

Q3. Refer to the exhibit. 

Which technology is represented by this configuration? 

A. AAA for FlexVPN 

B. AAA for EzVPN 

C. TACACS+ command authorization 

D. local command authorization 

Answer:

Q4. Which configuration is used to build a tunnel between a Cisco ASA and ISR? 

A. crypto map 

B. DMVPN 

C. GET VPN 

D. GRE with IPsec 

E. GRE without IPsec 

Answer:

Q5. Which command enables the router to form EIGRP neighbor adjacencies with peers using a different subnet than the ingress interface? 

A. ip unnumbered interface 

B. eigrp router-id 

C. passive-interface interface name 

D. ip split-horizon eigrp as number 

Answer:

Q6. Which three changes must be made to migrate from DMVPN Phase 2 to Phase 3 when EIGRP is configured? (Choose three.) 

A. Enable EIGRP next-hop-self on the hub. 

B. Disable EIGRP next-hop-self on the hub. 

C. Enable EIGRP split-horizon on the hub. 

D. Add NHRP redirects on the hub. 

E. Add NHRP shortcuts on the spoke. 

F. Add NHRP shortcuts on the hub. 

Answer: A,D,E 

Q7. Which Cisco ASDM option configures WebVPN access on a Cisco ASA? 

A. Configuration > WebVPN > WebVPN Access 

B. Configuration > Remote Access VPN > Clientless SSL VPN Access 

C. Configuration > WebVPN > WebVPN Config 

D. Configuration > VPN > WebVPN Access 

Answer:

Q8. Which statement regarding GET VPN is true? 

A. TEK rekeys can be load-balanced between two key servers operating in COOP. 

B. When you implement GET VPN with VRFs, all VRFs must be defined in the GDOI group configuration on the key server. 

C. Group members must acknowledge all KEK and TEK rekeys, regardless of configuration. 

D. The configuration that defines which traffic to encrypt is present only on the key server. 

E. The pseudotime that is used for replay checking is synchronized via NTP. 

Answer:

Q9. In DMVPN phase 2, which two EIGRP features need to be disabled on the hub to allow spoke-to-spoke communication? (Choose two.) 

A. autosummary 

B. split horizon 

C. metric calculation using bandwidth 

D. EIGRP address family 

E. next-hop-self 

F. default administrative distance 

Answer: B,E 

Q10. Which three parameters are specified in the isakmp (IKEv1) policy? (Choose three.) 

A. the hashing algorithm 

B. the authentication method 

C. the lifetime 

D. the session key 

E. the transform-set 

F. the peer 

Answer: A,B,C