[Free] 2019(Nov) EnsurePass Cisco 300-209 Dumps with VCE and PDF 131-140

Get Full Version of the Exam
http://www.EnsurePass.com/300-209.html

Question No.131

Which option is an example of an asymmetric algorithm?

  1. 3DES

  2. IDEA

  3. AES

  4. RSA

Correct Answer: D

Question No.132

A user is unable to establish an AnyConnect VPN connection to an ASA. When using the Real- Time Log viewer within ASDM to troubleshoot the issue, which two filter options would the administrator choose to show only syslog messages relevant to the VPN connection? (Choose two.)

  1. Client#39;s public IP address

  2. Client#39;s operating system

  3. Client#39;s default gateway IP address

  4. Client#39;s username

  5. ASA#39;s public IP address

Correct Answer: AD

Question No.133

Which transform set is contained in the IKEv2 default proposal?

  1. aes-cbc-192, sha256, group 14

  2. 3des, md5, group 7

  3. 3des, sha1, group 1

  4. aes-cbc-128, sha, group 5

Correct Answer: D

Question No.134

Which algorithm provides both encryption and authentication for plane communication?

  1. RC4

  2. SHA-384

  3. AES-256

  4. SHA-96

  5. 3DES

  6. AES-GCM

Correct Answer: F

Question No.135

When initiating a new SSL or TLS session, the client receives the server SSL certificate and validates it. After validating the server certificate, what does the client use the certificate for?

  1. The client and server use the server public key to encrypt the SSL session data.

  2. The server creates a separate session key and sends it to the client. The client decrypts the session key by using the server public key.

  3. The client and server switch to a DH key exchange to establish a session key.

  4. The client generates a random session key, encrypts it with the server public key, and then sends it to the server.

Correct Answer: D

Question No.136

Which two statements about the Cisco ASA Clientless SSL VPN smart tunnels feature are true? (Choose two.)

  1. Smart tunnels are enabled on the secure gateway (Cisco ASA) for specific applications that run on the end client and work irrespective of which transport protocol the application uses.

  2. Smart tunnels require Administrative privileges to run on the client machine.

  3. A smart tunnel is a DLL that is pushed from the headend to the client machine after SSL VPN portal authentication and that is attached to smart-tunneled processes to route traffic through the SSL VPN session with the gateway.

  4. Smart tunnels offer better performance than the client-server plugins.

  5. Smart tunnels are supported on Windows, Mac, and Linux.

Correct Answer: CD

Question No.137

Refer to the exhibit. Which VPN solution does this configuration represent?

image

  1. DMVPN

  2. GETVPN

  3. FlexVPN

  4. site-to-site

Correct Answer: B

Question No.138

Which equation describes an elliptic curve?

  1. y3 = x3 ax b

  2. x3 = y2 ab x

  3. y4 = x2 ax b

  4. y2 = x3 ax b

  5. y2 = x2 ax b2

Correct Answer: D

Question No.139

A company has decided to migrate an existing IKEv1 VPN tunnel to IKEv2. Which two are valid configuration constructs on a Cisco IOS router? (Choose two.)

  1. crypto ikev2 keyring keyring-name peer peer1

    address 209.165.201.1 255.255.255.255

    pre-shared-key local key1 pre-shared-key remote key2

  2. crypto ikev2 transform-set transform-set-name esp-3des esp-md5-hmac

    esp-aes esp-sha-hmac

  3. crypto ikev2 map crypto-map-name

    set crypto ikev2 tunnel-group tunnel-group-name set crypto ikev2 transform-set transform-set-name

  4. crypto ikev2 tunnel-group tunnel-group-name match identity remote address 209.165.201.1 authentication local pre-share

    authentication remote pre-share

  5. crypto ikev2 profile profile-name

match identity remote address 209.165.201.1 authentication local pre-share

authentication remote pre-share

Correct Answer: AE

Question No.140

What are two benefits of DMVPN Phase 3? (Choose two.)

  1. Administrators can use summarization of routing protocol updates from hub to spokes.

  2. It introduces hierarchical DMVPN deployments.

  3. It introduces non-hierarchical DMVPN deployments.

  4. It supports L2TP over IPSec as one of the VPN protocols.

Correct Answer: AB

Get Full Version of the Exam
300-209 Dumps
300-209 VCE and PDF

Leave a Reply