Implementing Secure Solutions with Virtual Private Networks (SVPN) Quiz Questions and Answers
A network administrator is configuring AES encryption for the ISAKMP policy on an IOS
router. Which two configurations are valid? (Choose two.)
Answer :
crypto isakmp policy 10 encryption aes 192
crypto isakmp policy 10 encryption aes 256
IN IPSEC VPN udp, 4500 port used by which of the following?
Answer :
ESP to encapsulate udp 4500
A private wan connection is suspected of intermittently corrupting data. Which technology
can a network administrator use to detect and drop the altered data traffic?
Answer :
SHA2-HMAC
A custom desktop application needs to access an internal server. An administrator is
tasked with configuring the company's SSL VPN gateway to allow remote users to work.
Which two technologies would accommodate the company's requirement? (Choose two).
Answer :
AnyConnect client
Smart Tunnels
Which type of NHRP packet is unique to Phase 3 DMVPN topologies?
Answer :
redirect
Which functionality is provided by L2TPv3 over FlexVPN?
Answer :
the extension of a Layer 2 domain across the FlexVPN
Which IPsec security protocol should be used when confidentiality is required?
Answer :
ESP
Which option is one component of a Public Key Infrastructure?
Answer :
the Registration Authority
which of the follwign supports Hub and spoke, spoke to spoke VPNs?
Answer :
DMVPN
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?