Which Cisco adaptive security appliance command can be used to view the IPsec PSK of a tunnel group in cleartext?

Correct Answer for the Question – Which Cisco adaptive security appliance command can be used to view the IPsec PSK of a tunnel group in cleartext? is given below Which Cisco adaptive security appliance command can be used to view the IPsec PSK of a tunnel group in cleartext? more system:running-config show running-config crypto show running-config … Read more

Which three configurations are required for both IPsec VTI and crypto map-based VPNs?

Correct Answer for the Question – Which three configurations are required for both IPsec VTI and crypto map-based VPNs? is given below Which three configurations are required for both IPsec VTI and crypto map-based VPNs? (Choose three.) transform set ISAKMP policy ACL that defines traffic to encrypt dynamic routing protocol tunnel interface IPsec profile PSK or … Read more

Which Cisco IOS VPN feature simplifies IPsec VPN configuration and design by using on-demand virtual access interfaces that are cloned from a virtual template configuration?

Correct Answer for the Question – Which Cisco IOS VPN feature simplifies IPsec VPN configuration and design by using on-demand virtual access interfaces that are cloned from a virtual template configuration? is given below Which Cisco IOS VPN feature simplifies IPsec VPN configuration and design by using on-demand virtual access interfaces that are cloned from a … Read more

Which three actions can be applied to a traffic class within a type inspect policy map?

Correct Answer for the Question – Which three actions can be applied to a traffic class within a type inspect policy map? is given below Which three actions can be applied to a traffic class within a type inspect policy map? (Choose three.) drop priority log pass inspect reset Correct Answer The Correct Answer for this … Read more

When troubleshooting established clientless SSL VPN issues, which three steps should be taken?

Correct Answer for the Question – When troubleshooting established clientless SSL VPN issues, which three steps should be taken? is given below When troubleshooting established clientless SSL VPN issues, which three steps should be taken? (Choose three.) Clear the browser history. Clear the browser and Java cache. Collect the information from the computer event log. Enable … Read more

Which three commands are included in the command show dmvpn detail?

Correct Answer for the Question – Which three commands are included in the command show dmvpn detail? is given below Which three commands are included in the command show dmvpn detail? (Choose three.) show ip nhrp nhs show dmvpn show crypto session detail show crypto ipsec sa detail show crypto sockets show ip nhrp Correct Answer … Read more

Which two EIGRP features need to be disabled on the hub to allow spoke-to-spoke communication?

Correct Answer for the Question – Which two EIGRP features need to be disabled on the hub to allow spoke-to-spoke communication? is given below In DMVPN phase 2, which two EIGRP features need to be disabled on the hub to allow spoke-to-spoke communication? (Choose two.) autosummary split horizon metric calculation using bandwidth EIGRP address family next-hop-self … Read more

Which three types of SSO functionality are available on the Cisco ASA without any external SSO servers?

Correct Answer for the Question – Which three types of SSO functionality are available on the Cisco ASA without any external SSO servers? is given below Which three types of SSO functionality are available on the Cisco ASA without any external SSO servers? (Choose three.) SAML HTTP POST HTTP Basic NTLM Kerberos OAuth 2.0 Correct Answer … Read more

Which three commands can be used for troubleshooting of the AAA subsystem?

Correct Answer for the Question – Which three commands can be used for troubleshooting of the AAA subsystem? is given below A user is trying to connect to a Cisco IOS device using clientless SSL VPN and cannot establish the connection. Which three commands can be used for troubleshooting of the AAA subsystem? (Choose three.) debug … Read more

Which of these are the two types of keys used when implementing GET VPN?

Correct Answer for the Question – Which of these are the two types of keys used when implementing GET VPN? is given below Which of these are the two types of keys used when implementing GET VPN? (Choose two.) key encryption group encryption pre-shared key public key private key traffic encryption key Correct Answer The Correct … Read more