Free 300-730 Exam Braindumps (page: 3)

Page 2 of 48

Which statement about GETVPN is true?

  1. The configuration that defines which traffic to encrypt originates from the key server.
  2. TEK rekeys can be load-balanced between two key servers operating in COOP.
  3. The pseudotime that is used for replay checking is synchronized via NTP.
  4. Group members must acknowledge all KEK and TEK rekeys, regardless of configuration.

Answer(s): A



Refer to the exhibit. Which two tunnel types produce the show crypto ipsec sa output seen in the exhibit? (Choose two.)

  1. crypto map
  2. DMVPN
  3. GRE
  4. FlexVPN
  5. VTI

Answer(s): B,E



Which two changes must be made in order to migrate from DMVPN Phase 2 to Phase 3 when EIGRP is configured? (Choose two.)

  1. Add NHRP shortcuts on the hub.
  2. Add NHRP redirects on the spoke.
  3. Disable EIGRP next-hop-self on the hub.
  4. Enable EIGRP next-hop-self on the hub.
  5. Add NHRP redirects on the hub.

Answer(s): C,E



Refer to the exhibit. A customer cannot establish an IKEv2 site-to-site VPN tunnel between two Cisco ASA devices. Based on the syslog message, which action brings up the VPN tunnel?

  1. Reduce the maximum SA limit on the local Cisco AS
  2. Increase the maximum in-negotiation SA limit on the local Cisco ASA.
  3. Remove the maximum SA limit on the remote Cisco ASA.
  4. Correct the crypto access list on both Cisco ASA devices.

Answer(s): B






Post your Comments and Discuss Cisco® 300-730 exam with other Community members:

300-730 Discussions & Posts