aiotestking uk

300-209 Exam Questions - Online Test


300-209 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. CORRECT TEXT 

Answer: Here are the steps as below: 

Step 1: configure key ring 

crypto ikev2 keyring mykeys 

peer SiteB.cisco.com 

address 209.161.201.1 

pre-shared-key local $iteA 

pre-shared key remote $iteB 

Step 2: Configure IKEv2 profile 

Crypto ikev2 profile default 

identity local fqdn SiteA.cisco.com 

Match identity remote fqdn SiteB.cisco.com 

Authentication local pre-share 

Authentication remote pre-share 

Keyring local mykeys 

Step 3: Create the GRE Tunnel and apply profile 

crypto ipsec profile default 

set ikev2-profile default 

Interface tunnel 0 

ip address 10.1.1.1 255.255.255.0 

Tunnel source eth 0/0 

Tunnel destination 209.165.201.1 

tunnel protection ipsec profile default 

end 

Q2. The Cisco AnyConnect client fails to connect via IKEv2 but works with SSL. The following error message is displayed: 

"Login Denied, unauthorized connection mechanism, contact your administrator" 

What is the most possible cause of this problem? 

A. DAP is terminating the connection because IKEv2 is the protocol that is being used. 

B. The client endpoint does not have the correct user profile to initiate an IKEv2 connection. 

C. The AAA server that is being used does not authorize IKEv2 as the connection mechanism. 

D. The administrator is restricting access to this specific user. 

E. The IKEv2 protocol is not enabled in the group policy of the VPN headend. 

Answer:

Q3. Which technology supports tunnel interfaces while remaining compatible with legacy VPN implementations? 

A. FlexVPN 

B. DMVPN 

C. GET VPN 

D. SSL VPN 

Answer:

Q4. A custom desktop application needs to access an internal server. An administrator is tasked with configuring the company's SSL VPN gateway to allow remote users to work. Which two technologies would accommodate the company's requirement? (Choose two). 

A. AnyConnect client 

B. Smart Tunnels 

C. Email Proxy 

D. Content Rewriter 

E. Portal Customizations 

Answer: A,B 

Q5. Which three types of SSO functionality are available on the Cisco ASA without any external SSO servers? (Choose three.) 

A. SAML 

B. HTTP POST 

C. HTTP Basic 

D. NTLM 

E. Kerberos 

F. OAuth 2.0 

Answer: B,C,D 

Q6. As network consultant, you are asked.to suggest a VPN technology that can support a multivendor environment and secure traffic between sites. Which technology should you recommend? 

A. DMVPN 

B. FlexVPN 

C. GET VPN 

D. SSL VPN 

Answer:

Q7. Scenario: 

You are the senior network security administrator for your organization. Recently and junior engineer configured a site-to-site IPsec VPN connection between your headquarters Cisco ASA and a remote branch office. 

You are now tasked with verifying the IKEvl IPsec installation to ensure it was properly configured according to designated parameters. Using the CLI on both the Cisco ASA and branch ISR, verify the IPsec configuration is properly configured between the two sites. 

NOTE: the show running-config command cannot be used for this exercise. 

Topology: 

Which transform set is being used on the branch ISR? 

A. Default 

B. ESP-3DES ESP-SHA-HMAC 

C. ESP-AES-256-MD5-TRANS mode transport 

D. TSET 

Answer:

Explanation: 

This can be seen from the “show crypto ipsec sa” command as shown below: