Cisco 300-730 - Implementing Secure Solutions with Virtual Private Networks (SVPN 300-730) Exam

Page:    1 / 38   
Total 188 questions

DRAG DROP -
Drag and drop the correct commands from the right onto the blanks within the code on the left to implement a design that allow for dynamic spoke-to-spoke communication. Not all commands are used.
Select and Place:



Answer :

Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_dmvpn/configuration/xe-16/sec-conn-dmvpn-xe-16-book/sec-conn-dmvpn-summ- maps.html

A second set of traffic selectors is negotiated between two peers using IKEv2. Which IKEv2 packet will contain details of the exchange?

  • A. IKEv2 IKE_SA_INIT
  • B. IKEv2 INFORMATIONAL
  • C. IKEv2 CREATE_CHILD_SA
  • D. IKEv2 IKE_AUTH


Answer : B


Refer to the exhibit. The DMVPN tunnel is dropping randomly and no tunnel protection is configured. Which spoke configuration mitigates tunnel drops?
A.

B.

C.

D.



Answer : D

On a FlexVPN hub-and-spoke topology where spoke-to-spoke tunnels are not allowed, which command is needed for the hub to be able to terminate FlexVPN tunnels?

  • A. interface virtual-access
  • B. ip nhrp redirect
  • C. interface tunnel
  • D. interface virtual-template


Answer : D

Which statement about GETVPN is true?

  • A. The configuration that defines which traffic to encrypt originates from the key server.
  • B. TEK rekeys can be load-balanced between two key servers operating in COOP.
  • C. The pseudotime that is used for replay checking is synchronized via NTP.
  • D. Group members must acknowledge all KEK and TEK rekeys, regardless of configuration.


Answer : A

Page:    1 / 38   
Total 188 questions