[Practical] 300-209 Cisco actual exam 91-100 (Mar 2017)

Concerning Cisco 300-209, a myriad of official document examinations will be computer-based hence the examinees could possibly find out its quiz success immediately after test. Your test middle of the town would certainly publish your intraday test out give you the guts host with test business once the each day test out done, your test business would certainly complete your got rid of give you your exam-commission Them business to consider whether or not to honor your validation. Because it is computer-based tests, possesses instantaneous access to help success, individual is definitely full intent issues, of which in excess of 80% multiple-choice issues, other concern varieties for example dragging, (specifically to tug the right formula picked out to the sure site), fill-in greeting card blanks(for the most part are quite obvious requires, for instance Ciscos IOS control) , sim with surgical procedures(for instance, MMC operational user interface among IIS seems and allow many specifications for ones practical surgical procedures), and some case tests(specifically provide a longer launch sentences with the case, and inquire in excess of twenty solutions good case). )


The article at Testaimer.com going over http://www.testaimer.com/300-209-test is very comprehensive.

2017 Mar 300-209 sample question

Q91. Which option shows the correct traffic selectors for the child SA on the remote ASA, when the headquarter ASA initiates the tunnel? 

A. Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 192.168.20.0/0-192.168.20.255/65535 

B. Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 192.168.22.0/0-192.168.22.255/65535 

C. Local selector 192.168.22.0/0-192.168.22.255/65535 Remote selector 192.168.33.0/0-192.168.33.255/65535 

D. Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 0.0.0.0/0 -0.0.0.0/65535 

E. Local selector 0.0.0.0/0 - 0.0.0.0/65535 Remote selector 192.168.22.0/0 -192.168.22.255/65535 

Answer:

Explanation: 

The traffic selector is used to determine which traffic should be protected (encrypted over the IPSec tunnel). We want this to be specific, otherwise Internet traffic will also be sent over the tunnel and most likely dropped on the remote side. Here, we just want to protect traffic from 192.168.33.0/24 (THE LOCAL SIDE) to 192.168.22.0/24 (THE REMOTE SIDE). 


Q92. A Cisco router may have a fan issue that could increase its temperature and trigger a failure. What troubleshooting steps would verify the issue without causing additional risks? 

A. Configure logging using commands "logging on", "logging buffered 4", and check for fan failure logs using "show logging" 

B. Configure logging using commands "logging on", "logging buffered 6", and check for fan failure logs using "show logging" 

C. Configure logging using commands "logging on", "logging discriminator msglog1 console 7", and check for fan failure logs using "show logging" 

D. Configure logging using commands "logging host 10.11.10.11", "logging trap 2", and check for fan failure logs at the syslog server 10.11.10.11 

Answer:


Q93. Which of the following could be used to configure remote access VPN Host-scan and pre-login policies? 

A. ASDM 

B. Connection-profile CLI command 

C. Host-scan CLI command under the VPN group policy 

D. Pre-login-check CLI command 

Answer:


Q94. Refer to the exhibit. 

Which VPN solution does this configuration represent? 

A. DMVPN 

B. GETVPN 

C. FlexVPN 

D. site-to-site 

Answer:


Q95. A custom desktop application needs to access an internal server. An administrator is tasked with configuring the company's SSL VPN gateway to allow remote users to work. Which two technologies would accommodate the company's requirement? (Choose two). 

A. AnyConnect client 

B. Smart Tunnels 

C. Email Proxy 

D. Content Rewriter 

E. Portal Customizations 

Answer: A,B 


Far out 300-209 pdf exam:

Q96. Which four activities does the Key Server perform in a GETVPN deployment? (Choose four.) 

A. authenticates group members 

B. manages security policy 

C. creates group keys 

D. distributes policy/keys 

E. encrypts endpoint traffic 

F. receives policy/keys 

G. defines group members 

Answer: A,B,C,D 


Q97. Refer to the exhibit. 

A customer cannot establish an IKEv2 site-to-site VPN tunnel between two Cisco ASA devices. Based on the syslog message, which action can bring up the VPN tunnel? 

A. Increase the maximum SA limit on the local Cisco ASA. 

B. Correct the crypto access list on both Cisco ASA devices. 

C. Remove the maximum SA limit on the remote Cisco ASA. 

D. Reduce the maximum SA limit on the local Cisco ASA. 

E. Correct the IP address in the local and remote crypto maps. 

F. Increase the maximum SA limit on the remote Cisco ASA. 

Answer:


Q98. Which interface is managed by the VPN Access Interface field in the Cisco ASDM IPsec Site-to-Site VPN Wizard? 

A. the local interface named "VPN_access" 

B. the local interface configured with crypto enable 

C. the local interface from which traffic originates 

D. the remote interface with security level 0 

Answer:


Q99. Scenario 

Your organization has just implemented a Cisco AnyConnect SSL VPN solution. Using Cisco ASDM, answer the questions regarding the implementation. 

Note: Not all screens or option selections are active for this exercise. 

Topology 

Default_Home 

Which address range will be assigned to the AnyConnect users? 

A. 10.10.15.40-50/24 

B. 209.165.201.20-30/24 

C. 192.168.1.100-150/24 

D. 10.10.15.20-30/24 

Answer:

Explanation: 

First Navigate to the Configuration -> Remote Access VPN tab and then choose the “AnyConnect Connection Profile as shown below: 

C:\Users\danielkeller\AppData\Local\Microsoft\Windows\INetCache\Content.Word\Capture. png 

Then, clicking on the AnyConnect Profile at the bottom will bring you to the edit page shown below: 

C:\Users\danielkeller\AppData\Local\Microsoft\Windows\INetCache\Content.Word\Capture. png 

From here, click the Select button on the “VPN_Address_Pool” and you will see the following pools defined: 

Here we see that the VPN_Address_Pool contains the IP address range of 10.10.15.20-10.10.15.30/24. 


Q100. A company has decided to migrate an existing IKEv1 VPN tunnel to IKEv2. Which two are valid configuration constructs on a Cisco IOS router? (Choose two.) 

A. crypto ikev2 keyring keyring-name 

peer peer1 

address 209.165.201.1 255.255.255.255 

pre-shared-key local key1 

pre-shared-key remote key2 

B. crypto ikev2 transform-set transform-set-name 

esp-3des esp-md5-hmac 

esp-aes esp-sha-hmac 

C. crypto ikev2 map crypto-map-name 

set crypto ikev2 tunnel-group tunnel-group-name 

set crypto ikev2 transform-set transform-set-name 

D. crypto ikev2 tunnel-group tunnel-group-name 

match identity remote address 209.165.201.1 

authentication local pre-share 

authentication remote pre-share 

E. crypto ikev2 profile profile-name 

match identity remote address 209.165.201.1 

authentication local pre-share 

authentication remote pre-share 

Answer: A,E