which two things happen to traffic that is inbound from the partner network (outside is 10.10.30.0/24) and the
You are working for a corporation that has connected its network to a partner network. Based on
this partial configuration that is supplied in the exhibit, which two things happen to traffic that is
inbound from the partner network (outside is 10.10.30.0/24) and the return traffic from the inside
as it travels through this router? (Choose two.)
how should the NAT configuration be set up?
You are a network administrator that is deploying a Cisco router that needs to support both PAT
and site-to-site VPN on one public IP address. In order to make both work simultaneously, how
should the NAT configuration be set up?
(Choose three.)
which command will automatically be re-enabled after a specific amount of time?
You are finding that the 802.1X-configured ports are going into the error-disable state. Which
command will show you the reason why the port is in the error-disable state, and which command
will automatically be re-enabled after a specific amount of time? (Choose two.)
What should you implement to ensure a higher degree of key material security?
Your company has a requirement that if security is compromised on phase 1 of a Diffie-Hellman
key exchange that a secondary option will strengthen the security on the IPsec tunnel. What
should you implement to ensure a higher degree of key material security?
Which solution on a Cisco router requires the loading of a protocol header definition file (PHDF)?
Which solution on a Cisco router requires the loading of a protocol header definition file (PHDF)?
Which of these should be your next step in troubleshooting this problem?
You are troubleshooting a problem for which end users are reporting connectivity issues. Your
network has been configured with Layer 2 protection controls. You have determined that the
DHCP snooping database is correct and that proper static addressing maps have been
configured. Which of these should be your next step in troubleshooting this problem?
which part of the VPN tunnel establishment process is failing?
You are troubleshooting a reported connectivity issue from a remote office whose users are
accessing corporate headquarters via an IPsec VPN connection. You issued a show crypto
isakmp sa command on the headend router, and the state has MM_NO_STATE. Which debug
command should you enter next, and which part of the VPN tunnel establishment process is
failing? (Choose two.)
What are two potential reasons for this problem?
You are installing a brand-new, site-to-site VPN tunnel and notice that it is not working correctly.
When connecting to the corporate router and issuing a show crypto ipsec sa command, you notice
that for this particular SA that packets are being encrypted but not decrypted. What are two
potential reasons for this problem? (Choose two.)
Which two of these are features of control plane security on a Cisco ISR?
Which two of these are features of control plane security on a Cisco ISR? (Choose two.)