لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which remote access VPN technology requires the use of the IPsec-proposal configuration option?
A. lientless SSLVPN
B. SLVPN Full Tunnel
C. KEv2-based VPN
D. KEv1-based VP
عرض الإجابة
اجابة صحيحة: C
السؤال #2
An organization wants to distribute remote access VPN load across 12 VPN headend locations supporting 25,000 simultaneous users. Which load balancing method meets this requirement?
A. qual cost, multipath load balancing
B. NS-based load balancing
C. nyConnect native load balancing
D. ne VPN profile per sit
عرض الإجابة
اجابة صحيحة: A
السؤال #3
A network engineer has set up a FlexVPN server to terminate multiple FlexVPN clients. The VPN tunnels are established without issue. However, when a Change of Authorization is issued by the RADIUS server, the FlexVPN server does not update the authorization of connected FlexVPN clients. Which action resolves this issue?
A. dd the aaa server radius dynamic-author command on the FlexVPN clients
B. dd the aaa server radius dynamic-author command on the FlexVPN server
C. ix the RADIUS key mismatch between the RADIUS server and FlexVPN clients
D. ix the RADIUS key mismatch between the RADIUS server and FlexVPN server
عرض الإجابة
اجابة صحيحة: B
السؤال #4
A network engineer is implementing a FlexVPN tunnel between two Cisco IOS routers. The FlexVPN tunnels will terminate on encrypted traffic on an interface configured with an IP MTU of 1500, and the company has a security policy to drop fragmented traffic coming into or leaving the network. The tunnel will be used to transfer TFTP data between users and internal servers. When the TFTP traffic is not traversing a VPN, it can have a maximum IP packet size of 1500. Assuming the encrypted payload will add 90 byt
A. et the tunnel IP MTU to 1500
B. et the tunnel tcp adjust-mss to 1360
C. et the tunnel tcp adjust-mss to 1460
D. et the tunnel IP MTU to 1400
عرض الإجابة
اجابة صحيحة: D
السؤال #5
An engineer has successfully established a Phase 1 and Phase 2 tunnel between two sites. Site A has internal subnet 192.168.0.0/24 and Site B has internal subnet 10.0.0.0/24. The engineer notices that no packets are decrypted at Site B. Pings to 192.168.0.1 from internal Site B devices make it to the Site B router, and the Site. A router has incrementing encrypt and decrypt counters. What must be done to ensure bidirectional communication between both sites?
A. nable PFS on the headend device
B. odify the routing at Site B so that traffic is sent to Site A
C. llow protocol ESP or AH on the firewall in front of the Site B router
D. onfigure the correct DH group on both devices
عرض الإجابة
اجابة صحيحة: B
السؤال #6
A clientless SSLVPN is set up to allow remote users to access internal HTTPS webservers. Users can access all but one server and see the message "Connection Failed. Server 192.188.0.101 unavailable" Pings between the Cisco ASA and the webserver are successful, and users can connect to the webserver when they use their computer in the internal network. Which action resolves this issue?
A. dd an SSL cipher that can be negotiated with the webserver to the Cisco ASA
B. dd the http 192
C. onfigure routing on the Cisco ASA so it can reach the webserver
D. onfigure a DNS server that can resolve the webserver domain on the Cisco AS
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Which feature allows a DMVPN Phase 3 spoke to switch to an alternate hub when the primary hub is unreachable?
A. HRP shortcut
B. ackup NHS
C. er-tunnel jitter probes
D. ulticast PI
عرض الإجابة
اجابة صحيحة: B
السؤال #8
After a user configures a connection profile with a bookmark list and tests the clientless SSLVPN connection, all of the bookmarks are grayed out. What must be done to correct this behavior?
A. onfigure a DNS server on the Cisco ASA and verify it has a record for the web server
B. pecify the correct port for the web server under the bookmark
C. erify HTTP/HTTPS connectivity between the Cisco ASA and the web server
D. pply the bookmark to the correct group policy
عرض الإجابة
اجابة صحيحة: A
السؤال #9
An engineer has configured Cisco AnyConnect VPN using IKEv2 on a Cisco IOS router. The user cannot connect in the Cisco AnyConnect client, but receives an alert message "Use a browser to gain access." Which action does the engineer take to resolve this issue?
A. orrect the URL address
B. eset user login credentials
C. isable the HTTP server
D. onnect using HTTPS
عرض الإجابة
اجابة صحيحة: C
السؤال #10
When a FlexVPN is configured, which two components must be configured for IKEv2?
A. ethod
B. rofile
C. reference
D. ersistence
E. roposa
عرض الإجابة
اجابة صحيحة: BE
السؤال #11
What is a benefit of Python virtual environments?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Which connections are retuned by the Layer 4 Traffic Monitor endpoint in the AsyncOS API 12.0 for Cisco Security Management appliances?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: D
السؤال #13
What is the minimum software version required of Cisco Security Management Appliance in order to use the API functionality?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: C
السؤال #14
What is the purpose of Cisco Umbrella Enforcement APIs?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: C
السؤال #15
Which Cisco ISE service is supported by the REST API with the Cisco pxGrid 2.0 provider?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Which category of operations is performed using the Monitoring REST APIs of Cisco ISE?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: C
السؤال #17
In the Cisco AMP for Endpoints API, which information about endpoints is provided by the Device Trajectory API?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: B
السؤال #18
What is a benefit provided by the Ansible configuration management tool?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: A
السؤال #19
What is a capability of the AsyncOS API for Cisco Security Management Appliances?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: C
السؤال #20
What is a benefit of using network configuration tools to automate security when reducing vulnerabilities that human error introduces and producing an infrastructure that minimizes attack surfaces?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: