Cisco 300-730 Exam
Implementing Secure Solutions with Virtual Private Networks (SVPN 300-730) (Page 2 )

Updated On: 15-Feb-2026

DRAG DROP (Drag and Drop is not supported)
Drag and drop the correct commands from the right onto the blanks within the code on the left to implement a design that allow for dynamic spoke-to-spoke communication. Not all commands are used.

Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:


Reference:

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_dmvpn/configuration/xe-16/sec-conn-dmvpn-xe-16-book/sec-conn-dmvpn-summ-maps.html



A second set of traffic selectors is negotiated between two peers using IKEv2. Which IKEv2 packet will contain details of the exchange?

  1. IKEv2 IKE_SA_INIT
  2. IKEv2 INFORMATIONAL
  3. IKEv2 CREATE_CHILD_SA
  4. IKEv2 IKE_AUTH

Answer(s): B

Explanation:

The information exchange would contain data exchanged between these two hosts. This would be found in the configuration payload of the INFOMRATION exchange.


Reference:

https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/115936-understanding-ikev2-packet-exch-debug.html



Refer to the exhibit.

The DMVPN tunnel is dropping randomly and no tunnel protection is configured. Which spoke configuration mitigates tunnel drops?






Answer(s): D



On a FlexVPN hub-and-spoke topology where spoke-to-spoke tunnels are not allowed, which command is needed for the hub to be able to terminate FlexVPN tunnels?

  1. interface virtual-access
  2. ip nhrp redirect
  3. interface tunnel
  4. interface virtual-template

Answer(s): C


Reference:

https://www.globalknowledge.com/us-en/resources/resource-library/articles/understanding-next-hop-resolution-protocol-commands/



Which statement about GETVPN is true?

  1. The configuration that defines which traffic to encrypt originates from the key server.
  2. TEK rekeys can be load-balanced between two key servers operating in COOP.
  3. The pseudotime that is used for replay checking is synchronized via NTP.
  4. Group members must acknowledge all KEK and TEK rekeys, regardless of configuration.

Answer(s): A






Post your Comments and Discuss Cisco 300-730 exam prep with other Community members:

Join the 300-730 Discussion