300-209 Premium Bundle

300-209 Premium Bundle

Implementing Cisco Secure Mobility Solutions (SIMOS) Certification Exam

4.5 
(36060 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 300-209 Free Practice Questions

Q1. When you configure IPsec VPN High Availability Enhancements, which technology does Cisco recommend that you enable to make reconvergence faster? 

A. EOT 

B. IP SLAs 

C. periodic IKE keepalives 

D. VPN fast detection 

Answer:

Q2. Remote users want to access internal servers behind an ASA using Microsoft terminal services. Which option outlines the steps required to allow users access via the ASA clientless VPN portal? 

A. 1. Configure a static pat rule for TCP port 3389 

2. Configure an inbound access-list to allow traffic from remote users to the servers 

3. Assign this access-list rule to the group policy 

B. 1. Configure a bookmark of the type http:// server-IP :3389 

2. Enable Smart tunnel on this bookmark 

3. Assign the bookmark to the desired group policy 

C. 1. Configure a Smart Tunnel application list 

2. Add the rdp.exe process to this list 

3. Assign the Smart Tunnel application list to the desired group policy 

D. 1. Upload an RDP plugin to the ASA 

2. Configure a bookmark of the type rdp:// server-IP 

3. Assign the bookmark list to the desired group policy 

Answer:

Q3. Refer to the exhibit. 

Which VPN solution does this configuration represent? 

A. DMVPN 

B. GETVPN 

C. FlexVPN 

D. site-to-site 

Answer:

Q4. Scenario: 

You are the senior network security administrator for your organization. Recently and junior engineer configured a site-to-site IPsec VPN connection between your headquarters Cisco ASA and a remote branch office. 

You are now tasked with verifying the IKEvl IPsec installation to ensure it was properly configured according to designated parameters. Using the CLI on both the Cisco ASA and branch ISR, verify the IPsec configuration is properly configured between the two sites. 

NOTE: the show running-config command cannot be used for this exercise. 

Topology: 

Which crypto map tag is being used on the Cisco ASA? 

A. outside_cryptomap 

B. VPN-to-ASA 

C. L2L_Tunnel 

D. outside_map1 

Answer:

Explanation: 

This is seen from the “show crypto ipsec sa” command on the ASA. 

Q5. Based on the provided ASDM configuration for the remote ASA, which one of the following is correct?

A. An access-list must be configured on the outside interface to permit inbound VPN traffic 

B. A route to 192.168.22.0/24 will not be automatically installed in the routing table 

C. The ASA will use a window of 128 packets (64x2) to perform the anti-replay check _ 

D. The tunnel can also be established on TCP port 10000 

Answer:

Explanation: 

Cisco IP security (IPsec) authentication provides anti-replay protection against an attacker duplicating encrypted packets by assigning a unique sequence number to each encrypted packet. The decryptor keeps track of which packets it has seen on the basis of these numbers. Currently, the default window size is 64 packets. Generally, this number (window size) is sufficient, but there are times when you may want to expand this window size. The IPsec Anti-Replay Window: Expanding and Disabling feature allows you to expand the window size, allowing the decryptor to keep track of more than 64 packets. 

Q6. In which situation would you enable the Smart Tunnel option with clientless SSL VPN? 

A. when a user is using an outdated version of a web browser 

B. when an application is failing in the rewrite process 

C. when IPsec should be used over SSL VPN 

D. when a user has a nonsupported Java version installed 

E. when cookies are disabled 

Answer:

Q7. Which three configuration parameters are mandatory for an IKEv2 profile? (Choose three.) 

A. IKEv2 proposal 

B. local authentication method 

C. match identity or certificate 

D. IKEv2 policy 

E. PKI certificate authority 

F. remote authentication method 

G. IKEv2 profile description 

H. virtual template 

Answer: B,C,F 

Q8. Which two examples of transform sets are contained in the IKEv2 default proposal? (Choose two.) 

A. aes-cbc-192, sha256, 14 

B. 3des, md5, 5 

C. 3des, sha1, 1 

D. aes-cbc-128, sha, 5 

Answer: B,D 

Q9. Which Cisco adaptive security appliance command can be used to view the count of all active VPN sessions? 

A. show vpn-sessiondb summary 

B. show crypto ikev1 sa 

C. show vpn-sessiondb ratio encryption 

D. show iskamp sa detail 

E. show crypto protocol statistics all 

Answer:

Q10. Refer to the exhibit. 

Which two characteristics of the VPN implementation are evident? (Choose two.) 

A. dual DMVPN cloud setup with dual hub 

B. DMVPN Phase 3 implementation 

C. single DMVPN cloud setup with dual hub 

D. DMVPN Phase 1 implementation 

E. quad DMVPN cloud with quadra hub 

F. DMVPN Phase 2 implementation 

Answer: B,C 

Q11. Which protocols does the Cisco AnyConnect client use to build multiple connections to the security appliance? 

A. TLS and DTLS 

B. IKEv1 

C. L2TP over IPsec 

D. SSH over TCP 

Answer:

Q12. Which two statements describe effects of the DoNothing option within the untrusted network policy on a Cisco AnyConnect profile? (Choose two.) 

A. The client initiates a VPN connection upon detection of an untrusted network. 

B. The client initiates a VPN connection upon detection of a trusted network. 

C. The always-on feature is enabled. 

D. The always-on feature is disabled. 

E. The client does not automatically initiate any VPN connection. 

Answer: A,D 

Q13. Refer to the exhibit. 

Which authentication method was used by the remote peer to prove its identity? 

A. Extensible Authentication Protocol 

B. certificate authentication 

C. pre-shared key 

D. XAUTH 

Answer:

Q14. Which two are features of GETVPN but not DMVPN and FlexVPN?.(Choose two.) 

A. one IPsec SA for all encrypted traffic 

B. no requirement for an overlay routing protocol 

C. design for use over public or private WAN 

D. sequence numbers that enable scalable replay checking 

E. enabled use of ESP or AH 

F. preservation of IP protocol in outer header 

Answer: A,B 

Q15. Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server? 

A. enrollment profile 

B. enrollment terminal 

C. enrollment url 

D. enrollment selfsigned 

Answer:

START 300-209 EXAM