Cisco® 300-209 Exam Practice Questions (P. 4)
- Full Access (314 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #31
Which Cisco ASDM option configures forwarding syslog messages to email?
- AConfiguration > Device Management > Logging > E-Mail Setup
- BConfiguration > Device Management > E-Mail Setup > Logging Enable
- CSelect the syslogs to email, click Edit, and select the Forward Messages option.
- DSelect the syslogs to email, click Settings, and specify the Destination Email Address option.
Correct Answer:
A
A
send
light_mode
delete
Question #32
Which Cisco ASDM option configures WebVPN access on a Cisco ASA?
- AConfiguration > WebVPN > WebVPN Access
- BConfiguration > Remote Access VPN > Clientless SSL VPN Access
- CConfiguration > WebVPN > WebVPN Config
- DConfiguration > VPN > WebVPN Access
Correct Answer:
B
B
send
light_mode
delete
Question #33
A user with IP address 10.10.10.10 is unable to access a HTTP website at IP address 209.165.200.225 through a Cisco ASA. Which two features and commands will help troubleshoot the issue? (Choose two.)
- ACapture user traffic using command capture capin interface inside match ip host 10.10.10.10 any
- BAfter verifying that user traffic reaches the firewall using syslogs or captures, use packet tracer command packet-tracer input inside tcp 10.10.10.10 1234 209.165.200.225 80
- CEnable logging at level 1 and check the syslogs using commands logging enable, logging buffered 1 and show logging | include 10.10.10.10
- DCheck if an access-list on the firewall is blocking the user by using command show running-config access-list | include 10.10.10.10
- EUse packet tracer command packet-tracer input inside udp 0.10.10.10 1234192.168.1.3 161 to see what the firewall is doing with the user's traffic
Correct Answer:
AB
AB
send
light_mode
delete
Question #34
A Cisco router may have a fan issue that could increase its temperature and trigger a failure. What troubleshooting steps would verify the issue without causing additional risks?
- AConfigure logging using commands "logging on", "logging buffered 4", and check for fan failure logs using "show logging"
- BConfigure logging using commands "logging on", "logging buffered 6", and check for fan failure logs using "show logging"
- CConfigure logging using commands "logging on", "logging discriminator msglog1 console 7", and check for fan failure logs using "show logging"
- DConfigure logging using commands "logging host 10.11.10.11", "logging trap 2", and check for fan failure logs at the syslog server 10.11.10.11
Correct Answer:
A
A
send
light_mode
delete
Question #35
An internet-based VPN solution is being considered to replace an existing private WAN connecting remote offices. A multimedia application is used that relies on multicast for communication. Which two VPN solutions meet the application's network requirement? (Choose two.)
- AFlexVPN
- BDMVPN
- CGroup Encrypted Transport VPN
- DCrypto-map based Site-to-Site IPsec VPNs
- EAnyConnect VPN
Correct Answer:
AB
AB
send
light_mode
delete
Question #36
A private wan connection is suspected of intermittently corrupting data. Which technology can a network administrator use to detect and drop the altered data traffic?
- AAES-128
- BRSA Certificates
- CSHA2-HMAC
- D3DES
- EDiffie-Helman Key Generation
Correct Answer:
C
C
send
light_mode
delete
Question #37
A company needs to provide secure access to its remote workforce. The end users use public kiosk computers and a wide range of devices. They will be accessing only an internal web application. Which VPN solution satisfies these requirements?
- AClientless SSLVPN
- BAnyConnect Client using SSLVPN
- CAnyConnect Client using IKEv2
- DFlexVPN Client
- EWindows built-in PPTP client
Correct Answer:
A
A
send
light_mode
delete
Question #38
A network administrator is configuring AES encryption for the ISAKMP policy on an IOS router. Which two configurations are valid? (Choose two.)
- Acrypto isakmp policy 10 encryption aes 254
- Bcrypto isakmp policy 10 encryption aes 192
- Ccrypto isakmp policy 10 encryption aes 256
- Dcrypto isakmp policy 10 encryption aes 196
- Ecrypto isakmp policy 10 encryption aes 198
- Fcrypto isakmp policy 10
Correct Answer:
BC
BC
send
light_mode
delete
Question #39
Which two qualify as Next Generation Encryption integrity algorithms? (Choose two.)
send
light_mode
delete
Question #40
Which statement is true when implementing a router with a dynamic public IP address in a crypto map based site-to-site VPN?
- AThe router must be configured with a dynamic crypto map.
- BCertificates are always used for phase 1 authentication.
- CThe tunnel establishment will fail if the router is configured as a responder only.
- DThe router and the peer router must have NAT traversal enabled.
Correct Answer:
C
C
send
light_mode
delete
All Pages