Implementing Secure Solutions with Virtual Private Networks (SVPN) Quiz Questions and Answers

A network administrator is configuring AES encryption for the ISAKMP policy on an IOS router. Which two configurations are valid? (Choose two.)

Answer :
  • crypto isakmp policy 10 encryption aes 192
  •  crypto isakmp policy 10 encryption aes 256

IN IPSEC VPN udp, 4500 port used by which of the following?

Answer :
  • ESP to encapsulate udp 4500

A private wan connection is suspected of intermittently corrupting data. Which technology can a network administrator use to detect and drop the altered data traffic?

Answer :
  • SHA2-HMAC

A custom desktop application needs to access an internal server. An administrator is tasked with configuring the company's SSL VPN gateway to allow remote users to work. Which two technologies would accommodate the company's requirement? (Choose two).

Answer :
  • AnyConnect client
  • Smart Tunnels

Which type of NHRP packet is unique to Phase 3 DMVPN topologies?

Answer :
  • redirect

Which functionality is provided by L2TPv3 over FlexVPN?

Answer :
  • the extension of a Layer 2 domain across the FlexVPN

Which IPsec security protocol should be used when confidentiality is required?

Answer :
  • ESP

Which option is one component of a Public Key Infrastructure?

Answer :
  • the Registration Authority

which of the follwign supports Hub and spoke, spoke to spoke VPNs?

Answer :
  • DMVPN

Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?

Answer :
  • Platform Exchange Grid