Wednesday 28 December 2016

300-209 Sample Question

QUESTION: 16

What are two variables for configuring clientless SSL VPN single sign-on? (Choose two.)

A. CSCO_WEBVPN_OTP_PASSWORD
B. CSCO_WEBVPN_INTERNAL_PASSWORD
C. CSCO_WEBVPN_USERNAME
D. CSCO_WEBVPN_RADIUS_USER

Answer: B,C

Thursday 15 December 2016

300-209 Sample Question

QUESTION: 15

An internet-based VPN solution is being considered to replace an existing private WAN connecting remote offices. A multimedia application is used that relies on multicast for communication. Which two VPN solutions meet the application's network requirement? (Choose two.)

A. FlexVPN
B. DMVPN
C. Group Encrypted Transport VPN
D. Crypto-map based Site-to-Site IPsec VPNs
E. AnyConnect VPN

Answer: A,B

Tuesday 9 August 2016

300-209 Sample Question

QUESTION: 14

A network is configured to allow clientless access to resources inside the network. Which feature must be enabled and configured to allow SSH applications to respond on the specified port 8889?

A. auto applet download
B. port forwarding
C. web-type ACL
D. HTTP proxy

Answer: B

Monday 25 July 2016

300-209 Sample Question

QUESTION: 13

A company has decided to migrate an existing IKEv1 VPN tunnel to IKEv2. Which two are valid configuration constructs on a Cisco IOS router? (Choose two.)

A. crypto ikev2 keyring keyring-name peer peer1 address 209.165.201.1 255.255.255.255 pre-shared-key local key1 pre-shared-key remote key2
B. crypto ikev2 transform-set transform-set-name esp-3des esp-md5-hmac esp-aes esp-sha-hmac
C. crypto ikev2 map crypto-map-name set crypto ikev2 tunnel-group tunnel-group-name set crypto ikev2 transform-set transform-set-name
D. crypto ikev2 tunnel-group tunnel-group-name match identity remote address 209.165.201.1 authentication local pre-share authentication remote pre-share
E. crypto ikev2 profile profile-name match identity remote address 209.165.201.1 authentication local pre-share authentication remote pre-share

Answer: A,E

Friday 1 July 2016

300-209 Sample Question

QUESTION: 12

Which four activities does the Key Server perform in a GETVPN deployment? (Choose four.)

A. authenticates group members
B. manages security policy
C. creates group keys
D. distributes policy/keys
E. encrypts endpoint traffic
F. receives policy/keys
G. defines group members

Answer : A,B,C,D

Wednesday 15 June 2016

300-209 Sample Question

QUESTION: 11

When an IPsec SVTI is configured, which technology processes traffic forwarding for encryption?

A. ACL
B. IP routing
C. RRI
D. front door VPN routing and forwarding

Answer: B

Tuesday 3 May 2016

300-209 Sample Question

Question No: 10

Which two are characteristics of GETVPN? (Choose two.)

A. The IP header of the encrypted packet is preserved
B. A key server is elected among all configured Group Members
C. Unique encryption keys are computed for each Group Member
D. The same key encryption and traffic encryption keys are distributed to all Group Members

Answer: A,D

Thursday 7 April 2016

300-209 Sample Question

Question No: 9

Which two things are correct about QinQ technology? (Choose two.)

A. The Outer.1Q tag represents customer VLAN ID and inner.1Q tag represents Service Provider VLAN (PVLAN)
B. It is an effective way to achieve VLAN transparency between Provider and enterprise customer by tunneling one ser of VLAN tags inside a second VLAN tag
C. The Outer.1Q tag represents Service Provider VLAN (PVLAN) and inner.1Q tag represents customer VLAN
D. QinQ is a way to hide native VLAN which can conflict with Provider native VLAN

Answer: B, C


Thursday 31 March 2016

300-209 Sample Question

Question No: 8

Which statements about the Route Target Rewrite feature are not true? (Choose two.)

A. After the route target replacement policy is applied to the target router, the BGP session need not be refreshed manually to put the policy into operation.
B. Route Target Rewrite allows the administration of the routing policy to stay local to the AS.
C. Route target replacement is always done by the ASBR.
D. Route target rewrites are supported for VRF export maps.
E. Route target replacement can be done on incoming and outgoing BGP updates.

Answer: A, C

Thursday 11 February 2016

300-209 Sample Question

Question No: 7

In FlexVPN, what is the role of a NHRP resolution request?

A. It allows these entities to directly communicate without requiring traffic to use an intermediate hop
B. It dynamically assigns VPN users to a group
C. It blocks these entities from to directly communicating with each other
D. It makes sure that each VPN spoke directly communicates with the hub

Answer: A

Explanation
Explanation/Reference:

Tuesday 2 February 2016

How To Paass c Implementing Cisco Secure Mobility Solutions (SIMOS)

Cisco 300-209 Exam- Tips to Pass



Cisco Question Answer:

Which four activities does the Key Server perform in a GETVPN deployment? (Choose four.)

A. authenticates group members
B. manages security policy
C. creates group keys
D. distributes policy/keys
E. encrypts endpoint traffic
F. receives policy/keys
G. defines group members

Answer: A,B,C,D

Cisco System Price Target To & 30 Court Reiterates Oppenheimer Outperform (NASDAQ: CSCO)


Cisco Systems (NASDAQ: CSCO) had its low price target to $ 30 from $ 32 by Oppenheimer, while the company maintains an outperform rating on the stock.

The decrease in stock of 1.30% or $ 0.31 during the last trading session, reaching $ 23.48. Approximately 23.85 million shares traded hands. Cisco Systems, Inc. (NASDAQ: CSCO) fell 16.23% from June 25, 2015 and is downtrending. It underperformed the 8.52% of the S & P500 was obtained.

Cisco Systems, Inc. designs, manufactures and sells network Internet Protocol (IP) based and related information technology and communications industry in the world services. It provides switching products, including modular and fixed switches configuration, and storage products that provide connectivity to end users, workstations, IP phones, wireless access points and servers; and next generation products connecting to the public network routing and private cable and wireless networks for mobile applications, data, voice and video. Currently, the company provides the infrastructure service provider video, including decoders, products / access for cable and cable modems; and video solutions and software. It also provides collaboration products including products unified communications, conferencing products, telepresence systems, and enterprise mobile messaging products; products for data centers, virtualization solutions such as blade, rack and modular servers, interconnects web, software, server access and; Security products, including network security and data center, advanced threat protection, web and email security, access and policy, unified threat management, and advice from integration and managed services; and other products, such as emerging technologies and other network products.

In addition, the company provides wireless products, consisting of wireless access points; Network management services; and autonomous switch-convergent solutions and managed cloud. It also provides technical support services and advanced services. The company serves companies of all sizes, public institutions, governments and providers of communications services. Cisco Systems, Inc. sells products directly ITS as well as through distribution partners such as systems integrators, service providers, other resellers and distributors. The company was founded in 1984 and is headquartered in San Jose, California.