Which configuration will enable the hub router to provide IP addresses to spokes, in a hub-spoke configuration?
The Cisco ASA uses a hierarchical policy inheritance model. Which user policies would have the highest priority using this model?
What are the two aspects of effectively managing the VPN users and their access privileges in any remote access VPN design? (Choose two)
Which information can be obtained using the ASDM when monitoring a Cisco AnyConnect VPN on a server? (Choose three)
You are testing an application plugin for a clientless SSL VPN session; however, it will not start. What should be done?
Which key size is typically used by ECC?
Which command can be used to prompt remote SSL VPN Client users to download the client and remain until the user responds?
Which two site-to-site VPN technologies natively support IP Multicasts? (Choose two)
Which two statements are true regarding GET VPN compatibility with network devices? (Choose two)
Which statements regarding the use of parallel DTLS and TLS tunnels are true? (Choose two)
What is the purpose of FlexVPN? (Choose two)
When configuring router-to-ASA FlexVPN, what match statement rules should you keep in mind? (Choose two)
How can Cisco ASA assign IP addresses in an SSL VPN full tunnel solution? (Choose three)
All client traffic is utilizing the VPN tunnel. Clients accessing the Internet should have direct access to external data. What should be enabled?
What command is used to enable authentication, authorization, and accounting?
Which statements best describe shortcut switching? (Choose two)
Which statements best describe dynamic access policies in Cisco clientless SSL VPNs? (Choose two)
How do both Cisco ASA and Cisco IOS routers facilitate resource and application access? (Choose two)
What are the three VPN connection technologies? (Choose three)
When using double or triple authentication for Cisco AnyConnect SSL VPN users, what combinations are possible? (Choose three)
Your company is planning to implement HostScan to provide high availability. Clients run MAC OS X operating systems. What would prevent you from being able to use HostScan?
Which statements best describe the NHRP client-server protocol? (Choose two)
When implementing a basic Cisco AnyConnect SSL VPN solution, what is used to specify whether all IP traffic is protected?
You are configuring DMVPN on a spoke router. The configurations in the output given below have been made on the router.Which command or set of commands will complete the next step in the configuration on the spoke router?
When troubleshooting a FlexVPN spoke configuration, which command is used to verify whether both spokes have a virtual-access interface present?
What should you keep in mind in a configuration scenario that uses the local CA function on the Cisco ASA CA user accounts? (Choose two)
Which options best describe site-to-site VPN? (Choose two)
Which statements best describe FlexVPN? (Choose two)
Refer to the output. Which statements regarding the output are true? (Choose two)
Before deploying a basic site-to-site VPN, what information should you have? (Choose three)
You are creating an IKEv2 policy. Which command will ensure that a packet has not been modified during transit?
Using an SSL VPN full-tunnel solution, you want to have the Cisco ASA assign IP addresses that will allow you to identify which users are connecting to the VPN. Which IP address assignment solution should be implemented?
Why would you use the Cisco AnyConnect Start Before Logon feature? (Choose two)
A connection is not forming between the spoke and the hub. Enter the command that you would use to verify SA states on hub and spoke. (Choose two)
What is the role of the responder in IKEv2 DoS prevention? (Choose two)
What limitations should you consider when using GRE tunneling? (Choose two)
Which statements regarding the verification of DMVPN full-mesh routing and IKE peering are true? (Choose two)
Which method of certificate enrollment using SCEP automates the enrollment of Cisco AnyConnect users?
Which statements best describe the handshake phase of SSL connections? (Choose two)
How is external authorization in AnyConnect SSL VPNs monitored? (Choose two)
What should you consider when using a hub-and-spoke FlexVPN deployment model? (Choose two)
What is required when establishing a connection using AnyConnect in Standalone mode? (Choose two)
Which command would be used to verify the DMVPN NBMA address?
What is ESP encapsulation designed to provide? (Choose four)
When a clientless SSL VPN user successfully authenticates to the Cisco Adaptive Security Appliance, the user is presented with a web portal where they can access protected resources behind the Cisco ASA. What types of applications can a user access by default? (Choose two)
Which statements regarding the verification of DMVPN hub-and-spoke routing and IKE peering are true? (Choose two)
Which two protocols are used for full client and clientless connections by Cisco VPNs? (Choose two)
You want to display NHRP next-hop server information. Which command should you use?
Which statement best describes the purpose of Cisco IPSec VTI?
When enabling smart tunnels in the clientless SSL VPN access, what kind of information can you specify? (Choose three)
What common clientless SSL VPN issue involves troubleshooting by analyzing the integration with an external server such as Cisco Identity Services Engine?
You are configuring basic Cisco AnyConnect SSL VPN on the Cisco ASA. During which step in the process would you configure split tunneling?
Which statement is true regarding a Cisco ASA security appliance and IPSec?
Which type of certificate is required for clientless SSL VPN connections to the Cisco ASA?
Which application access method is available with Cisco clientless SSL VPNs and is recommended for Linux?