Choose three characteristics of DTLS. (Choose three.)
Datagram Transport Layer Security (DTLS) was introduced to solve performance issues. Choose
three characteristics of DTLS. (Choose three.)
Choose both a tunnel policy option and an ACL type to accomplish this design goal. (Choose two.)
When establishing a Cisco AnyConnect SSL VPN tunnel, a system administrator wants to restrict
remote home office users to either print to their local printer or send the remaining traffic down the
Cisco AnyConnect SSL VPN tunnel (with restricted Internet access).
Choose both a tunnel policy option and an ACL type to accomplish this design goal. (Choose two.)
When deploying clientless SSL VPNs, what should you do to support external unmanaged VPN clients?
When deploying clientless SSL VPNs, what should you do to support external unmanaged VPN
clients?
A Unified Communications Certificate is used on the Cisco ASA appliance to support which option?
A Unified Communications Certificate is used on the Cisco ASA appliance to support which
option?
What is a troubleshooting step that you should perform to determine the cause of the access problem?
You are the network security administrator. You receive a call from a user stating that he cannot
log onto the network. In the process of troubleshooting, you determine that this user is accessing
the network via certificate-based Cisco AnyConnect SSL VPN.
What is a troubleshooting step that you should perform to determine the cause of the access
problem?
which type of VPN tunneling should you use to allow the VPN traffic
When attempting to tunnel FTP traffic through a stateful firewall that might be performing NAT or
PAT, which type of VPN tunneling should you use to allow the VPN traffic through the stateful
firewall?
Where is the correct place to tune the IPsec policy parameters in Cisco ASDM?
After adding a remote-access IPsec tunnel via the VPN wizard, an administrator needs to tune the
IPsec policy parameters. Where is the correct place to tune the IPsec policy parameters in Cisco
ASDM?
Which statement is correct concerning the SSL VPN authorization process?
Authorization of a clientless SSL VPN defines the actions that a user may perform within a
clientless SSL VPN session. Which statement is correct concerning the SSL VPN authorization
process?
Which statement regarding the IP address is true?
Which statement regarding the IP address is true?
Case Study Title (Case Study):
The user, contractor1, receives an IP address when the VPN connection is established. Which
statement regarding the IP address is true?
Upon logging in, user, emploeyee1, has two privileges? (Choose two)
Upon logging in, user, emploeyee1, has two privileges? (Choose two)
Case Study Title (Case Study):
Upon logging in, user, emploeyee1, has two privileges: (Choose two)