aiotestking uk

300-209 Exam Questions - Online Test


300-209 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. You have deployed new Cisco AnyConnect start before logon modules and set the configuration to download modules before logon, but all client connections continue to use the previous version of the module. Which action must you take to correct the problem? 

A. Configure start before logon in the client profile. 

B. Configure a group policy to prompt the user to download the updated module. 

C. Define the modules for download in the client profile. 

D. Define the modules for download in the group policy. 

Answer:

Q2. Refer to the exhibit. 

The IKEv2 tunnel between Router1 and Router2 is failing during session establishment. Which action will allow the session to establish correctly? 

A. The address command on Router2 must be narrowed down to a /32 mask. 

B. The local and remote keys on Router2 must be switched. 

C. The pre-shared key must be altered to use only lowercase letters. 

D. The local and remote keys on Router2 must be the same. 

Answer:

Q3. Which protocol does DTLS use for its transport? 

A. TCP 

B. UDP 

C. IMAP 

D. DDE 

Answer:

Q4. Which.DAP endpoint attribute checks for the matching MAC address of a client machine? 

A. device 

B. process 

C. antispyware 

D. BIA 

Answer:

Q5. Which option is an example of an asymmetric algorithm? 

A. 3DES 

B. IDEA 

C. AES 

D. RSA 

Answer:

Q6. A customer requires all traffic to go through a VPN. However, access to the local network is also required. Which two options can enable this configuration? (Choose two.) 

A. split exclude 

B. use of an XML profile 

C. full tunnel by default 

D. split tunnel 

E. split include 

Answer: A,B 

Q7. Which equation describes an elliptic curve? 

A. y3 = x3 + ax + b 

B. x3 = y2 + ab + x 

C. y4 = x2 + ax + b 

D. y2 = x3 + ax + b 

E. y2 = x2 + ax + b2 

Answer:

Q8. Which command clears all crypto configuration from a Cisco Adaptive Security Appliance? 

A. clear configure crypto 

B. clear configure crypto ipsec 

C. clear crypto map 

D. clear crypto ikev2 sa 

Answer:

Q9. Remote users want to access internal servers behind an ASA using Microsoft terminal services. Which option outlines the steps required to allow users access via the ASA clientless VPN portal? 

A. 1. Configure a static pat rule for TCP port 3389 

2. Configure an inbound access-list to allow traffic from remote users to the servers 

3. Assign this access-list rule to the group policy 

B. 1. Configure a bookmark of the type http:// server-IP :3389 

2. Enable Smart tunnel on this bookmark 

3. Assign the bookmark to the desired group policy 

C. 1. Configure a Smart Tunnel application list 

2. Add the rdp.exe process to this list 

3. Assign the Smart Tunnel application list to the desired group policy 

D. 1. Upload an RDP plugin to the ASA 

2. Configure a bookmark of the type rdp:// server-IP 

3. Assign the bookmark list to the desired group policy 

Answer:

Q10. Which Cisco adaptive security appliance command can be used to view the IPsec PSK of a tunnel group in cleartext? 

A. more system:running-config 

B. show running-config crypto 

C. show running-config tunnel-group 

D. show running-config tunnel-group-map 

E. clear config tunnel-group 

F. show ipsec policy 

Answer: