300-209 Premium Bundle

300-209 Premium Bundle

Implementing Cisco Secure Mobility Solutions (SIMOS) Certification Exam

4.5 
(33375 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 300-209 Free Practice Questions

Q1. In a spoke-to-spoke DMVPN topology, which type of interface does a branch router require? 

A. Virtual tunnel interface 

B. Multipoint GRE interface 

C. Point-to-point GRE interface 

D. Loopback interface 

Answer:

Q2. Which option shows the correct traffic selectors for the child SA on the remote ASA, when the headquarter ASA initiates the tunnel? 

A. Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 192.168.20.0/0-192.168.20.255/65535 

B. Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 192.168.22.0/0-192.168.22.255/65535 

C. Local selector 192.168.22.0/0-192.168.22.255/65535 Remote selector 192.168.33.0/0-192.168.33.255/65535 

D. Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 0.0.0.0/0 -0.0.0.0/65535 

E. Local selector 0.0.0.0/0 - 0.0.0.0/65535 Remote selector 192.168.22.0/0 -192.168.22.255/65535 

Answer:

Explanation: 

The traffic selector is used to determine which traffic should be protected (encrypted over the IPSec tunnel). We want this to be specific, otherwise Internet traffic will also be sent over the tunnel and most likely dropped on the remote side. Here, we just want to protect traffic from 192.168.33.0/24 (THE LOCAL SIDE) to 192.168.22.0/24 (THE REMOTE SIDE). 

Q3. Which command is used to determine how many GMs have registered in a GETVPN environment? 

A. show crypto isakmp sa 

B. show crypto gdoi ks members 

C. show crypto gdoi gm 

D. show crypto ipsec sa 

E. show crypto isakmp sa count 

Answer:

Q4. Which NGE IKE Diffie-Hellman group identifier has the strongest cryptographic properties? 

A. group 10 

B. group 24 

C. group 5 

D. group 20 

Answer:

Q5. What is the Cisco recommended TCP maximum segment on a DMVPN tunnel interface when the MTU is set to 1400 bytes? 

A. 1160 bytes 

B. 1260 bytes 

C. 1360 bytes 

D. 1240 bytes 

Answer:

Q6. When an IPsec SVTI is configured, which technology processes traffic forwarding for encryption? 

A. ACL 

B. IP routing 

C. RRI 

D. front door VPN routing and forwarding 

Answer:

Q7. Which Cisco adaptive security appliance command can be used to view the IPsec PSK of a tunnel group in cleartext? 

A. more system:running-config 

B. show running-config crypto 

C. show running-config tunnel-group 

D. show running-config tunnel-group-map 

E. clear config tunnel-group 

F. show ipsec policy 

Answer:

Q8. A user is unable to establish an AnyConnect VPN connection to an ASA. When using the Real-Time Log viewer within ASDM to troubleshoot the issue, which two filter options would the administrator choose to show only syslog messages relevant to the VPN connection? (Choose two.) 

A. Client's public IP address 

B. Client's operating system 

C. Client's default gateway IP address 

D. Client's username 

E. ASA's public IP address 

Answer: A,D 

Q9. You are troubleshooting a site-to-site VPN issue where the tunnel is not establishing. After issuing the debug crypto isakmp command on the headend router, you see the following output. What does this output suggest? 

1d00h: ISAKMP (0:1): atts are not acceptable. Next payload is 0 

1d00h: ISAKMP (0:1); no offers accepted! 

1d00h: ISAKMP (0:1): SA not acceptable! 

1d00h: %CRYPTO-6-IKMP_MODE_FAILURE. Processing of Main Mode failed with peer at 10.10.10.10 

A. Phase 1 policy does not match on both sides. 

B. The transform set does not match on both sides. 

C. ISAKMP is not enabled on the remote peer. 

D. There is a mismatch in the ACL that identifies interesting traffic. 

Answer:

Q10. Which two technologies are considered to be Suite B cryptography? (Choose two.) 

A. MD5 

B. SHA2 

C. Elliptical Curve Diffie-Hellman 

D. 3DES 

E. DES 

Answer: B,C 

Q11. Which two statements regarding IKEv2 are true per RFC 4306? (Choose two.) 

A. It is compatible with IKEv1. 

B. It has at minimum a nine-packet exchange. 

C. It uses aggressive mode. 

D. NAT traversal is included in the RFC. 

E. It uses main mode. 

F. DPD is defined in RFC 4309. 

G. It allows for EAP authentication. 

Answer: D,G 

Q12. What are the three primary components of a GET VPN network? (Choose three.) 

A. Group Domain of Interpretation protocol 

B. Simple Network Management Protocol 

C. server load balancer 

D. accounting server 

E. group member 

F. key server 

Answer: A,E,F 

Q13. Which cryptographic algorithms are approved to protect Top Secret information? 

A. HIPPA DES 

B. AES-128 

C. RC4-128 

D. AES-256 

Answer:

Q14. If the IKEv2 tunnel were to establish successfully, which encryption algorithm would be used to encrypt traffic? 

A. DES 

B. 3DES 

C. AES 

D. AES192 

E. AES256 

Answer:

Explanation: 

Both ASA’s are configured to support AES 256, so during the IPSec negotiation they will use the strongest algorithm that is supported by each peer. 

Q15. Which option is an example of an asymmetric algorithm? 

A. 3DES 

B. IDEA 

C. AES 

D. RSA 

Answer:

START 300-209 EXAM