Implementing Cisco Secure Mobility Solutions (SIMOS) 300-209 Rapidshare

Your success in Cisco 300-209 is our sole target and we develop all our 300-209 braindumps in a way that facilitates the attainment of this target. Not only is our 300-209 study material the best you can find, it is also the most detailed and the most updated. 300-209 Practice Exams for Cisco 300-209 are written to the highest standards of technical accuracy.

Free 300-209 Demo Online For Cisco Certifitcation:

Page: 1 / 30
Total 362 questions Full Exam Access
Question 1
- (Exam Topic 2)
A user is trying to connect to a Cisco IOS device using clientless SSL VPN and cannot establish the connection. Which three commands can be used for troubleshooting of the AAA subsystem? (Choose three.)
My answer: -
Reference answer: ABD
Reference analysis:

None

Question 2
- (Exam Topic 1)
Which two parameters are specified in the isakmp (IKEv1) policy? (Choose two.)
My answer: -
Reference answer: AD
Reference analysis:

None

Question 3
- (Exam Topic 3)
Refer to the exhibit.
300-209 dumps exhibit
A NOC engineer is in the process of entering information into the Create New VPN Connection Entry fields. Which statement correctly describes how to do this?
My answer: -
Reference answer: D
Reference analysis:

http://www.cisco.com/en/US/docs/security/vpn_client/cisco_vpn_client/vpn_client46/win/user/guide/vc4.html#
Step 1 Start the VPN Client by choosing Start > Programs > Cisco Systems VPN Client > VPN Client.
Step 2 The VPN Client application starts and displays the advanced mode main window (Figure 4-1). If you are not already there, open the Options menu in simple mode and choose Advanced Mode or press Ctrl-M.
\"300-209
Step 3 Select New from the toolbar or the Connection Entries menu. The VPN Client displays a form
\"300-209
Step 4 Enter a unique name for this new connection. You can use any name to identify this connection; for example, Engineering. This name can contain spaces, and it is not case-sensitive.
Step 5 Enter a description of this connection. This field is optional, but it helps further identify this connection. For example, Connection to Engineering remote server.
Step 6 Enter the hostname or IP address of the remote VPN device you want to access. Group Authentication
Your network administrator usually configures group authentication for you. If this is not the case, use the following procedure:
Step 1 Click the Group Authentication radio button.
Step 2 In the Name field, enter the name of the IPSec group to which you belong. This entry is case-sensitive. Step 3 In the Password field, enter the password (which is also case-sensitive) for your IPSec group. The field
displays only asterisks.
Step 4 Verify your password by entering it again in the Confirm Password field.

Question 4
- (Exam Topic 2)
Refer to the exhibit.
300-209 dumps exhibit
What technology does the given configuration demonstrate?
My answer: -
Reference answer: B
Reference analysis:

None

Question 5
- (Exam Topic 2)
Which algorithm provides both encryption and authentication for data plane communication?
My answer: -
Reference answer: E
Reference analysis:

None

Question 6
- (Exam Topic 1)
300-209 dumps exhibit
300-209 dumps exhibit
300-209 dumps exhibit
When a tunnel is initiated by the headquarter ASA, which one of the following Diffie-Hellman groups is selected by the headquarter ASA during CREATE_CHILD_SA exchange?
My answer: -
Reference answer: C
Reference analysis:

Traffic initiated by the HQ ASA is assigned to the static outside crypto map, which shown below to use DH
group 5.
\"300-209

Question 7
- (Exam Topic 3)
300-209 dumps exhibit
Refer to the exhibit. Client 1 cannot communication with Client 2. Both clients are using Cisco AnyConnect and have established a successful SSL VPN connection to the hub ASA. Which command on the ASA is missing?
My answer: -
Reference answer: B
Reference analysis:

None

Question 8
- (Exam Topic 3)
Refer to the exhibit.
300-209 dumps exhibit
A junior network engineer configured the corporate Cisco ASA appliance to accommodate a new temporary worker. For security reasons, the IT department wants to restrict the internal network access of the new temporary worker to the corporate server, with an IP address of 10.0.4.10. After the junior network engineer finished the configuration, an IT security specialist tested the account of the temporary worker. The tester was able to access the URLs of additional secure servers from the WebVPN user account of the temporary worker.
What did the junior network engineer configure incorrectly?
My answer: -
Reference answer: B
Reference analysis:

None

Question 9
- (Exam Topic 2)
Which technology is FlexVPN based on?
My answer: -
Reference answer: C
Reference analysis:

None

Question 10
- (Exam Topic 3)
Refer to the exhibit.
300-209 dumps exhibit
What is the problem with the IKEv2 site-to-site VPN tunnel?
My answer: -
Reference answer: D
Reference analysis:

None

Question 11
- (Exam Topic 1)
What are two benefits of DMVPN Phase 3? (Choose two.)
My answer: -
Reference answer: AB
Reference analysis:

None

Question 12
- (Exam Topic 1)
A private wan connection is suspected of intermittently corrupting data. Which technology can a network administrator use to detect and drop the altered data traffic?
My answer: -
Reference answer: C
Reference analysis:

None

Question 13
- (Exam Topic 2)
Which two statements about the Cisco ASAClientless SSL VPN solution are true? (Choose two.)
My answer: -
Reference answer: CD
Reference analysis:

None

Question 14
- (Exam Topic 2)
Which cryptographic algorithms are a part of the Cisco NGE suite?
My answer: -
Reference answer: D
Reference analysis:


Reference: https://www.cisco.com/web/learning/le21/le39/docs/tdw166_prezo.pdf

Question 15
- (Exam Topic 1)
An internet-based VPN solution is being considered to replace an existing private WAN connecting remote offices. A multimedia application is used that relies on multicast for communication. Which two VPN solutions meet the application's network requirement? (Choose two.)
My answer: -
Reference answer: AB
Reference analysis:

None

Question 16
- (Exam Topic 1)
Refer to the exhibit.
300-209 dumps exhibit
After the configuration is performed, which combination of devices can connect?
My answer: -
Reference answer: D
Reference analysis:

None

Question 17
- (Exam Topic 1)
Refer to the exhibit.
300-209 dumps exhibit
An administrator had the above configuration working with SSL protocol, but as soon as the administrator specified IPsec as the primary protocol, the Cisco AnyConnect client was not able to connect. What is the problem?
My answer: -
Reference answer: C
Reference analysis:

None

Question 18
- (Exam Topic 1)
What are two forms of SSL VPN? (Choose two.)
My answer: -
Reference answer: CD
Reference analysis:

None

Question 19
- (Exam Topic 3)
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
My answer: -
Reference answer: A
Reference analysis:

None

Question 20
- (Exam Topic 1)
An administrator wishes to limit the networks reachable over the Anyconnect VPN tunnels. Which configuration on the ASA will correctly limit the networks reachable to 209.165.201.0/27 and 209.165.202.128/27?
My answer: -
Reference answer: A
Reference analysis:

None

Question 21
- (Exam Topic 1)
A company needs to provide secure access to its remote workforce. The end users use public kiosk computers and a wide range of devices. They will be accessing only an internal web application. Which VPN solution satisfies these requirements?
My answer: -
Reference answer: A
Reference analysis:

None

Question 22
What is the name of the transform set being used on the ISR?
My answer: -
Reference answer: B
Reference analysis:

None

Question 23
- (Exam Topic 2)
An administrator desires that when work laptops are not connected to the corporate network, they should automatically initiate an AnyConnect VPN tunnel back to headquarters. Where does the administrator configure this?
My answer: -
Reference answer: B
Reference analysis:

None

Question 24
- (Exam Topic 1)
An engineer is troubleshooting DMVPN and wants to check if traffic flows in only one direction
My answer: -
Reference answer: A
Reference analysis:

None

Question 25
- (Exam Topic 3)
An XYZ Corporation systems engineer, while making a sales call on the ABC Corporation headquarters, tried to access the XYZ sales demonstration folder to transfer a demonstration via FTP from an ABC conference room behind the firewall. The engineer could not reach XYZ through the remote-access VPN tunnel. From home the previous day, however, the engineer did connect to the XYZ sales demonstration folder and transferred the demonstration via IPsec over DSL.
To get the connection to work and transfer the demonstration, what should the engineer do?
My answer: -
Reference answer: C
Reference analysis:

IP Security (IPSec) over Transmission Control Protocol (TCP) enables a VPN Client to operate in an environment in which standard Encapsulating Security Protocol (ESP, Protocol 50) or Internet Key Exchange (IKE, User Datagram Protocol (UDP) 500) cannot function, or can function only with modification to existing firewall rules. IPSec over TCP encapsulates both the IKE and IPSec protocols within a TCP packet, and it enables secure tunneling through both Network Address Translation (NAT) and Port Address Translation (PAT) devices and firewalls

Question 26
- (Exam Topic 1)
A custom desktop application needs to access an internal server. An administrator is tasked with configuring the company's SSL VPN gateway to allow remote users to work. Which two technologies would accommodate the company's requirement? (Choose two).
My answer: -
Reference answer: AB
Reference analysis:

None

Question 27
- (Exam Topic 1)
Drag and drop the debug messages on the left onto the associated function during trouble shooting on the right.
300-209 dumps exhibit
Solution:
300-209 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 28
- (Exam Topic 2)
Which two are features of GETVPN but not DMVPN and FlexVPN? (Choose two.)
My answer: -
Reference answer: AB
Reference analysis:

None

Question 29
- (Exam Topic 3)
Which DAP endpoint attribute checks for the matching MAC address of a client machine?
My answer: -
Reference answer: A
Reference analysis:

None

Page: 1 / 30
Total 362 questions Full Exam Access