300-209 Premium Bundle

300-209 Premium Bundle

Implementing Cisco Secure Mobility Solutions (SIMOS) Certification Exam

4.5 
(1290 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 300-209 Free Practice Questions

Q1. If the IKEv2 tunnel were to establish successfully, which encryption algorithm would be used to encrypt traffic? 

A. DES 

B. 3DES 

C. AES 

D. AES192 

E. AES256 

Answer:

Explanation: 

Both ASA’s are configured to support AES 256, so during the IPSec negotiation they will use the strongest algorithm that is supported by each peer. 

Q2. Which option describes what address preservation with IPsec Tunnel Mode allows when GETVPN is used? 

A. stronger encryption methods 

B. Network Address Translation of encrypted traffic 

C. traffic management based on original source and destination addresses 

D. Tunnel Endpoint Discovery 

Answer:

Q3. Which statement about the hub in a DMVPN configuration with iBGP is true? 

A. It must be a route reflector client. 

B. It must redistribute EIGRP from the spokes. 

C. It must be in a different AS. 

D. It must be a route reflector. 

Answer:

Q4. Which Cisco adaptive security appliance command can be used to view the IPsec PSK of a tunnel group in cleartext? 

A. more system:running-config 

B. show running-config crypto 

C. show running-config tunnel-group 

D. show running-config tunnel-group-map 

E. clear config tunnel-group 

F. show ipsec policy 

Answer:

Q5. Which command identifies an AnyConnect profile that was uploaded to the router flash? 

A. crypto vpn anyconnect profile SSL_profile flash:simos-profile.xml 

B. svc import profile SSL_profile flash:simos-profile.xml 

C. anyconnect profile SSL_profile flash:simos-profile.xml 

D. webvpn import profile SSL_profile flash:simos-profile.xml 

Answer:

Q6. In the Cisco ASDM interface, where do you enable the DTLS protocol setting? 

A. Configuration > Remote Access VPN > Network (Client) Access > Group Policies > Add or Edit > Add or Edit Internal Group Policy 

B. Configuration > Remote Access VPN > Network (Client) Access > AAA Setup > Local Users > Add or Edit 

C. Device Management > Users/AAA > User Accounts > Add or Edit > Add or Edit User Account > VPN Policy > SSL VPN Client 

D. Configuration > Remote Access VPN > Network (Client) Access > Group Policies > Add or Edit 

Answer:

Reference: 

http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect20/admini strative/guide/admin/admin5.html 

Shows where DTLS can be configured as: 

. Configuration > Remote Access VPN > Network (Client) Access > Group Policies > Add or Edit > Add or Edit Internal Group Policy > Advanced > SSL VPN Client 

. Configuration > Remote Access VPN > Network (Client) Access > AAA Setup > Local Users > Add or Edit > Add or Edit User Account > VPN Policy > SSL VPN Client 

.Device Management > Users/AAA > User Accounts > Add or Edit > Add or Edit User Account > VPN Policy > SSL VPN Client 

Q7. Refer to the exhibit. 

An administrator is adding IPv6 addressing to an already functioning tunnel. The administrator is unable to ping 2001:DB8:100::2 but can ping 209.165.200.226. Which configuration needs to be added or changed? 

A. No configuration change is necessary. Everything is working correctly. 

B. OSPFv3 needs to be configured on the interface. 

C. NHRP needs to be configured to provide NBMA mapping. 

D. Tunnel mode needs to be changed to GRE IPv4. 

E. Tunnel mode needs to be changed to GRE IPv6. 

Answer:

Q8. Scenario: 

You are the senior network security administrator for your organization. Recently and junior engineer configured a site-to-site IPsec VPN connection between your headquarters Cisco ASA and a remote branch office. 

You are now tasked with verifying the IKEvl IPsec installation to ensure it was properly configured according to designated parameters. Using the CLI on both the Cisco ASA and branch ISR, verify the IPsec configuration is properly configured between the two sites. 

NOTE: the show running-config command cannot be used for this exercise. 

Topology: 

In what state is the IKE security association in on the Cisco ASA? 

A. There are no security associations in place 

B. MM_ACTIVE 

C. ACTIVE(ACTIVE) 

D. QM_IDLE 

Answer:

Explanation: 

This can be seen from the "show crypto isa sa" command: 

Q9. Which three types of web resources or protocols are enabled by default on the Cisco ASA Clientless SSL VPN portal? (Choose three.) 

A. HTTP 

B. VNC 

C. CIFS 

D. RDP 

E. HTTPS 

F. ICA (Citrix) 

Answer: A,C,E 

Q10. Which three parameters are specified in the isakmp (IKEv1) policy? (Choose three.) 

A. the hashing algorithm 

B. the authentication method 

C. the lifetime 

D. the session key 

E. the transform-set 

F. the peer 

Answer: A,B,C 

Q11. Which type of communication in a FlexVPN implementation uses an NHRP shortcut? 

A. spoke to hub 

B. spoke to spoke 

C. hub to spoke 

D. hub to hub 

Answer:

Q12. A rogue static route is installed in the routing table of a Cisco FlexVPN and is causing 

traffic to be blackholed. Which command should be used to identify the peer from which that route originated? 

A. show crypto ikev2 sa detail 

B. show crypto route 

C. show crypto ikev2 client flexvpn 

D. show ip route eigrp 

E. show crypto isakmp sa detail 

Answer:

Q13. Which two statements describe effects of the DoNothing option within the untrusted network policy on a Cisco AnyConnect profile? (Choose two.) 

A. The client initiates a VPN connection upon detection of an untrusted network. 

B. The client initiates a VPN connection upon detection of a trusted network. 

C. The always-on feature is enabled. 

D. The always-on feature is disabled. 

E. The client does not automatically initiate any VPN connection. 

Answer: A,D 

Q14. Refer to the exhibit. 

Which type of VPN implementation is displayed? 

A. IKEv2 reconnect 

B. IKEv1 cluster 

C. IKEv2 load balancer 

D. IKEv1 client 

E. IPsec high availability 

F. IKEv2 backup gateway 

Answer:

Q15. Which two are characteristics of GETVPN? (Choose two.) 

A. The IP header of the encrypted packet is preserved 

B. A key server is elected among all configured Group Members 

C. Unique encryption keys are computed for each Group Member 

D. The same key encryption and traffic encryption keys are distributed to all Group Members 

Answer: A,D 

START 300-209 EXAM