لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Topic 1Which two parameters help to map a VPN session to a tunnel group without using the tunnel-group list?(Choose two.)
A. group-alias
B. certificate map
C. optimal gateway selection
D. group-url
E. AnyConnect client version
عرض الإجابة
اجابة صحيحة: BD
السؤال #2
Which statement about GETVPN is true?
A. The configuration that defines which traffic to encrypt originates from the key server
B. TEK rekeys can be load-balanced between two key servers operating in COOP
C. The pseudotime that is used for replay checking is synchronized via NTP
D. Group members must acknowledge all KEK and TEK rekeys, regardless of configuration
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Which two tunnel types produce the show crypto ipsec sa output seen in the exhibit? (Choose two.)
A. crypto map
B. DMVPN
C. GRE
D. FlexVPN
E. VTI
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which two protocols does DMVPN leverage to build dynamic VPNs to multiple destinations? (Choose two.)
A. KEv2
B. HRP
C. GRE
D. BGP
E. DOI
عرض الإجابة
اجابة صحيحة: BC
السؤال #5
Topic 2Refer to the exhibit. Which value must be configured in the User Group field when the Cisco AnyConnect Profile is created toconnect to an ASA headend with IPsec as the primary protocol?
A. address-pool
B. group-alias
C. group-policy
D. tunnel-group
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Topic 1Refer to the exhibit. A customer cannot establish an IKEv2 site-to-site VPN tunnel between two Cisco ASA devices. Basedon the syslog message, which action brings up the VPN tunnel?
A. Reduce the maximum SA limit on the local Cisco ASA
B. Increase the maximum in-negotiation SA limit on the local Cisco ASA
C. Remove the maximum SA limit on the remote Cisco ASA
D. Correct the crypto access list on both Cisco ASA devices
عرض الإجابة
اجابة صحيحة: B
السؤال #7
A network engineer must expand a company's Cisco AnyConnect solution. Currently, a Cisco ASA is set up in North America and another will be installed in Europe with a different IP address. Users should connect to the ASA that has the lowest Round Trip Time from their network location as measured by the AnyConnect client. Which solution must be implemented to meet this requirement? Optimal Gateway Selection (OGS). OGS is a feature that can be used in order to determine which gateway has the lowest Round Trip
A. PN Load Balancing
B. P SLA
C. NS Load Balancing
D. ptimal Gateway Selection
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Topic 1A second set of traffic selectors is negotiated between two peers using IKEv2. Which IKEv2 packet will contain details of theexchange?
A. IKEv2 IKE_SA_INIT
B. IKEv2 INFORMATIONAL
C. IKEv2 CREATE_CHILD_SA
D. IKEv2 IKE_AUTH
عرض الإجابة
اجابة صحيحة: B
السؤال #9
On a FlexVPN hub-and-spoke topology where spoke-to-spoke tunnels are not allowed, which command is needed for the hub to be able to terminate FlexVPN tunnels?
A. interface virtual-access
B. ip nhrp redirect
C. interface tunnel
D. interface virtual-template
عرض الإجابة
اجابة صحيحة: D
السؤال #10
A second set of traffic selectors is negotiated between two peers using IKEv2. Which IKEv2 packet will contain details of the exchange?
A. IKEv2 IKE_SA_INIT
B. IKEv2 INFORMATIONAL
C. IKEv2 CREATE_CHILD_SA
D. IKEv2 IKE_AUTH
عرض الإجابة
اجابة صحيحة: S
السؤال #11
Topic 2Which two types of web resources or protocols are enabled by default on the Cisco ASA Clientless SSL VPN portal?(Choose two.)
A. HTTP
B. ICA (Citrix)
C. VNC
D. RDP
E. CIFS
عرض الإجابة
اجابة صحيحة: DE
السؤال #12
An engineer is requesting an SSL certificate for a VPN load-balancing cluster in which two Cisco ASAs provide clientless SSLVPN access. The FQDN that users will enter to access the clientless VPN is asa.example.com, and users will be redirected to either asa1.example.com or asa2.example.com. The cluster FQDN and individual Cisco ASAs FQDNs resolve to IP addresses 192.168.0.1, 192.168.0.2, and 192.168.0.3 respectively. The issued certificate must be able to be used to validate the identity of either ASA in t
A. N=*
B. N=192
C. N=asa
D. N=192
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Topic 1On a FlexVPN hub-and-spoke topology where spoke-to-spoke tunnels are not allowed, which command is needed for thehub to be able to terminate FlexVPN tunnels?
A. interface virtual-access
B. ip nhrp redirect
C. interface tunnel
D. interface virtual-template
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Topic 1Which statement about GETVPN is true?
A. The configuration that defines which traffic to encrypt originates from the key server
B. TEK rekeys can be load-balanced between two key servers operating in COOP
C. The pseudotime that is used for replay checking is synchronized via NTP
D. Group members must acknowledge all KEK and TEK rekeys, regardless of configuration
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Topic 1Which method dynamically installs the network routes for remote tunnel endpoints?
A. policy-based routing
B. CEF
C. reverse route injection
D. route filtering
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Topic 1Refer to the exhibit. Which two tunnel types produce the show crypto ipsec sa output seen in the exhibit?(Choose two.)
A. crypto map
B. DMVPN
C. GRE
D. FlexVPN
E. VTI
عرض الإجابة
اجابة صحيحة: BE
السؤال #17
Which value must be configured in the User Group field when the Cisco AnyConnect Profile is created to connect to an ASA headend with IPsec as the primary protocol?
A. address-pool
B. group-alias
C. group-policy
D. tunnel-group
عرض الإجابة
اجابة صحيحة: CE
السؤال #18
Topic 2Which command identifies a Cisco AnyConnect profile that was uploaded to the flash of an IOS router?
A. svc import profile SSL_profile flash:simos-profile
B. anyconnect profile SSL_profile flash:simos-profile
C. crypto vpn anyconnect profile SSL_profile flash:simos-profile
D. webvpn import profile SSL_profile flash:simos-profile
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Topic 2Which configuration construct must be used in a FlexVPN tunnel?
A. EAP configuration
B. multipoint GRE tunnel interface
C. IKEv1 policy
D. IKEv2 profile
عرض الإجابة
اجابة صحيحة: D
السؤال #20
Topic 1Which two changes must be made in order to migrate from DMVPN Phase 2 to Phase 3 when EIGRP is configured?(Choose two.)
A. Add NHRP shortcuts on the hub
B. Add NHRP redirects on the spoke
C. Disable EIGRP next-hop-self on the hub
D. Enable EIGRP next-hop-self on the hub
E. Add NHRP redirects on the hub
عرض الإجابة
اجابة صحيحة: CE
السؤال #21
What is configured as a result of this command set?
A. FlexVPN client profile for IPv6
B. FlexVPN server to authorize groups by using an IPv6 external AAA
C. FlexVPN server for an IPv6 dVTI session
D. FlexVPN server to authenticate IPv6 peers by using EAP
عرض الإجابة
اجابة صحيحة: B
السؤال #22
Topic 1Refer to the exhibit. The DMVPN tunnel is dropping randomly and no tunnel protection is configured. Which spokeconfiguration mitigates tunnel drops?
A. Option A
B. Option B
C. Option C
D. Option D
عرض الإجابة
اجابة صحيحة: D
السؤال #23
A network administrator wants to block traffic to a known malware site at https:/www.badsite.com and all subdomains while ensuring no packets from any internal client are sent to that site. Which type of policy must the network administrator use to accomplish this goal? The correct answer is A. Access Control policy with URL filtering. An Access Control policy is a type of policy that allows you to control how traffic is handled on your network based on various criteria, such as source and destination IP ad
A. ccess Control policy with URL filtering
B. refilter policy
C. NS policy
D. SL policy
B) Prefilter policy is a type of policy that allows you to perform fast actions on traffic before it reaches the Access Control policy. You can use prefilter rules to drop, fastpath, or trust traffic based on simple criteria, such as IP addresses or ports
C) DNS policy is a type of policy that allows you to inspect and modify DNS requests and responses on your network. You can use DNS rules to block, monitor, or sinkhole DNS queries based on the requested domain name or the response IP address
D) SSL policy is a type of policy that allows you to decrypt and inspect encrypted traffic on your network. You can use SSL rules to determine which traffic to decrypt based on various criteria, such as certificate attributes, cipher suites, or URL categories
عرض الإجابة
اجابة صحيحة: A
السؤال #24
Topic 2Refer to the exhibit. What is configured as a result of this command set?
A. FlexVPN client profile for IPv6
B. FlexVPN server to authorize groups by using an IPv6 external AAA
C. FlexVPN server for an IPv6 dVTI session
D. FlexVPN server to authenticate IPv6 peers by using EAP
عرض الإجابة
اجابة صحيحة: A
السؤال #25
An engineer is creating an URL object on Cisco FMC. How must it be configured so that the object will match for HTTPS traffic in an access control policy? Use the FQDN including the subdomain for the website.According to the Firepower Management Center Configuration Guide, Version 6.61, when you create a URL object, you must use the fully qualified domain name (FQDN) of the website, including any subdomains, and omit the protocol prefix (HTTP or HTTPS). For example, to match www.example.com, you must enter
A. pecify the protocol to match (HTTP or HTTPS)
B. se the FQDN including the subdomain for the website
C. se the subject common name from the website certificate
D. efine the path to the individual webpage that uses HTTPS
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: