Top Cisco 300-209 resource Choices

Act now and download your Cisco 300-209 test today! Do not waste time for the worthless Cisco 300-209 tutorials. Download Updated Cisco Implementing Cisco Secure Mobility Solutions (SIMOS) exam with real questions and answers and begin to learn Cisco 300-209 with a classic professional.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 300-209 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 300-209 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/300-209-exam-dumps.html

2021 Mar 300-209 test preparation

Q1. Which cryptographic algorithms are a part of the Cisco NGE suite? 

A. HIPPA DES 

B. AES-CBC-128 

C. RC4-128 

D. AES-GCM-256 

Answer:

Explanation: Reference: 

https://www.cisco.com/web/learning/le21/le39/docs/tdw166_prezo.pdf 


Q2. Which technology can rate-limit the number of tunnels on a DMVPN hub when system utilization is above a specified percentage? 

A. NHRP Event Publisher 

B. interface state control 

C. CAC 

D. NHRP Authentication 

E. ip nhrp connect 

Answer:


Q3. Scenario: 

You are the senior network security administrator for your organization. Recently and junior engineer configured a site-to-site IPsec VPN connection between your headquarters Cisco ASA and a remote branch office. 

You are now tasked with verifying the IKEvl IPsec installation to ensure it was properly configured according to designated parameters. Using the CLI on both the Cisco ASA and branch ISR, verify the IPsec configuration is properly configured between the two sites. 

NOTE: the show running-config command cannot be used for this exercise. 

Topology: 

Which transform set is being used on the branch ISR? 

A. Default 

B. ESP-3DES ESP-SHA-HMAC 

C. ESP-AES-256-MD5-TRANS mode transport 

D. TSET 

Answer:

Explanation: 

This can be seen from the “show crypto ipsec sa” command as shown below: 


Q4. Which three remote access VPN methods in an ASA appliance provide support for Cisco Secure Desktop? (Choose three.) 

A. IKEv1 

B. IKEv2 

C. SSL client 

D. SSL clientless 

E. ESP 

F. L2TP 

Answer: B,C,D 


Q5. CORRECT TEXT 

Scenario 

You are the network security administrator for your organization. Your company is growing and a remote branch office is being created. You are tasked with configuring your headquarters Cisco ASA to create a site-to-site IPsec VPN connection to the branch office Cisco ISR. The branch office ISR has already been deployed and configured and you need to complete the IPsec connectivity configurations on the HQ ASA to bring the new office online. 

Use the following parameters to complete your configuration using ASDM. For this exercise, not all ASDM screens are active. 

. Enable IKEv1 on outside I/F for Site-to-site VPN 

. Add a Connection Profile with the following parameters: 

. Peer IP: 203.0.113.1 

. Connection name: 203.0.113.1 

. Local protected network: 10.10.9.0/24 

. Remote protected network: 10.11.11.0/24 

. Group Policy Name: use the default policy name supplied 

. Preshared key: cisco 

. Disable IKEv2 

. Encryption Algorithms: use the ASA defaults 

. Disable pre-configured NAT for testing of the IPsec tunnel 

. Disable the outside NAT pool rule 

. Establish the IPsec tunnel by sending ICMP pings from the Employee PC to the Branch Server at IP address 10.11.11.20 

. Verify tunnel establishment in ASDM VPN Statistics> Sessions window pane 

You have completed this exercise when you have successfully configured, established, and verified site-to-site IPsec connectivity between the ASA and the Branch ISR. 

Topology 

Answer: Review the explanation for detailed answer steps. 

Explanation: 

First, click on Configuration ->Site-to-Site VPN to bring up this screen: 

Click on “allow IKE v1 Access” for the outside per the instructions as shown below: 

Then click apply at the bottom of the page. This will bring up the following pop up message: 

Click on Send. 

Next, we need to set up the connection profile. From the connection profile tab, click on “Add” 

Then, fill in the information per the instructions as shown below: 

Hit OK and you should see this: 

To test this, we need to disable NAT. Go to Configuration -> Firewall -> NAT rules and you should see this: 

Click on Rule 1 to get the details and you will see this: 

We need to uncheck the “Enable rule” button on the bottom. It might also be a good idea to uncheck the “Translate DNS replies that match the rule” but it should not be needed. Then, go back to the topology: 

Click on Employee PC, and you will see a desktop with a command prompt shortcut. Use this to ping the IP address of 10.11.11.20 and you should see replies: 

We can also verify by viewing the VPN Statistics -> Sessions and see the bytes in/out incrementing as shown below: 


Far out 300-209 test question:

Q6. To change the title panel on the logon page of the Cisco IOS WebVPN portal, which file must you configure? 

A. Cisco IOS WebVPN customization template 

B. Cisco IOS WebVPN customization general 

C. web-access-hlp.inc 

D. app-access-hlp.inc 

Answer:


Q7. A Cisco router may have a fan issue that could increase its temperature and trigger a failure. What troubleshooting steps would verify the issue without causing additional risks? 

A. Configure logging using commands "logging on", "logging buffered 4", and check for fan failure logs using "show logging" 

B. Configure logging using commands "logging on", "logging buffered 6", and check for fan failure logs using "show logging" 

C. Configure logging using commands "logging on", "logging discriminator msglog1 console 7", and check for fan failure logs using "show logging" 

D. Configure logging using commands "logging host 10.11.10.11", "logging trap 2", and check for fan failure logs at the syslog server 10.11.10.11 

Answer:


Q8. Remote users want to access internal servers behind an ASA using Microsoft terminal services. Which option outlines the steps required to allow users access via the ASA clientless VPN portal? 

A. 1. Configure a static pat rule for TCP port 3389 

2. Configure an inbound access-list to allow traffic from remote users to the servers 

3. Assign this access-list rule to the group policy 

B. 1. Configure a bookmark of the type http:// server-IP :3389 

2. Enable Smart tunnel on this bookmark 

3. Assign the bookmark to the desired group policy 

C. 1. Configure a Smart Tunnel application list 

2. Add the rdp.exe process to this list 

3. Assign the Smart Tunnel application list to the desired group policy 

D. 1. Upload an RDP plugin to the ASA 

2. Configure a bookmark of the type rdp:// server-IP 

3. Assign the bookmark list to the desired group policy 

Answer:


Q9. Which two cryptographic technologies are recommended for use with FlexVPN? (Choose two.) 

A. SHA (HMAC variant) 

B. Diffie-Hellman 

C. DES 

D. MD5 (HMAC variant) 

Answer: A,B 


Q10. Refer to the exhibit. 

Which two characteristics of the VPN implementation are evident? (Choose two.) 

A. dual DMVPN cloud setup with dual hub 

B. DMVPN Phase 3 implementation 

C. single DMVPN cloud setup with dual hub 

D. DMVPN Phase 1 implementation 

E. quad DMVPN cloud with quadra hub 

F. DMVPN Phase 2 implementation 

Answer: B,C