642-648

Deploying Cisco ASA VPN Solutions (VPN v2.0)


Note: The answer is for reference only, you need to understand all question.
QUESTION 1
Which statement is correct concerning the trusted network detection (TND) feature?
A. The Cisco AnyConnect 3.0 Client supports TND on Windows, Mac, and Linux platforms.
B. With TND, one result of a Cisco Secure Desktop basic scan on an endpoint is to determine whether a device is a member of a trusted or an untrusted network.
C. If enabled, and a CSD scan determines that a host is a member of an untrusted network, an administrator can configure the TND feature to prohibit an end user from launching the Cisco AnyConnect VPN Client.
D. When the user is inside the corporate network, TND can be configured to automatically disconnect a Cisco AnyConnect session.
Answer: D

QUESTION 2
Refer to the exhibit.
You are configuring a laptop with the Cisco VPN Client, which uses digital certificates for authentication. Which protocol does the Cisco VPN Client use to retrieve the digital certificate from the CA server?
Exhibit:


A. FTP
B. LDAP
C. HTTPS
D. SCEP
E. OSCP
Answer: D


QUESTION 3
When using clientless SSL VPN, you might not want some applications or web resources to go through the Cisco ASA appliance. For these application and web resources, as a Cisco ASA administrator, which configuration should you use?
A. Configure the Cisco ASA appliance for split tunneling.
B. Configure network access exceptions in the SSL VPN customization editor.
C. Configure the Cisco ASA appliance to disable content rewriting.
D. Configure the Cisco ASA appliance to enable URL Entry bypass.
E. Configure smart tunnel to bypass the Cisco ASA appliance proxy function.

Answer: C


QUESTION 4
The "level_2" digital certificate was installed on a laptop.What can cause an "invaliD. not active" status message?
Exhibit:

A. On first use, a CA server-supplied passphrase is entered to validate the certificate.
B. A "newly installed" digital certificate does not become active until it is validated by the peer device upon its first usage.
C. The user has not clicked the Verify button within the Cisco VPN Client.
D. The CA server and laptop PC clocks are out of sync.
Answer: D


QUESTION 5
A NOC engineer is in the process of entering information into the Create New VPN Connection Entry fields. Which statement correctly describes how to do this?
Exhibit:


A.In the Connection Entry field, enter the name of the connection profile as it is specified on the Cisco ASA appliance
B.In the Host field, enter the IP address of the remote client device.
C.In the Authentication tab, click the Group Authentication or Mutual Group Authentication radio button to enable symmetrical pre-shared key authentication.
D.In the Name field, enter the name of the connection profile as it is specified on the Cisco ASA appliance.
Answer: D


QUESTION 6
A new NOC engineer is troubleshooting a VPN connection. Which statement about the fields within the Cisco VPN Client Statistics screen is correct?
Exhibit:


A. The ISP-assigned IP address of 10.0.21.1 is assigned to the VPN adapter of the PC.
B. The IP address of the security appliance to which the Cisco VPN Client is connected is 192.168.1.2.
C. CorpNet is the name of the Cisco ASA group policy whose tunnel parameters the connection is using.
D. The ability of the client to send packets transparently and unencrypted through the tunnel for test purposes is turned off.
E. With split tunneling enabled, the Cisco VPN Client registers no decrypted packets.
Answer: B


QUESTION 7
An XYZ Corporation systems engineer, while making a sales call on the ABC Corporation headquarters, tried to access the XYZ sales demonstration folder to transfer a demonstration via FTP from an ABC conference room behind the firewall. The engineer could not reach XYZ through the remote-access VPN tunnel. From home the previous day, however, the engineer did connect to the XYZ sales demonstration folder and transferred the demonstration via IPsec over DSL.
To get the connection to work and transfer the demonstration, what should the engineer do?
A. Change the MTU size on the IPsec client to account for the change from DSL to cable transmission.
B. Enable the local LAN access option on the IPsec client.
C. Enable the IPsec over TCP option on the IPsec client.
D. Enable the clientless SSL VPN option on the PC.

Answer: C


QUESTION 8
While configuring a site-to-site VPN tunnel, a new NOC engineer encounters the Reverse Route Injection parameter. Assuming that static routes are redistributed by the Cisco ASA to the IGP, what effect does enabling Reverse Route Injection on the local Cisco ASA have on a configuration?
Exhibit:

A.The local Cisco ASA advertises its default routes to the distant end of the site-to-site VPN tunnel. B.The local Cisco ASA advertises routes from the dynamic routing protocol that is running on the local Cisco
ASA to the distant end of the site-to-site VPN tunnel.
C.The local Cisco ASA advertises routes that are at the distant end of the site-to-site VPN tunnel.
D.The local Cisco ASA advertises routes that are on its side of the site-to-site VPN tunnel to the distant end of
the site-to-site VPN tunnel.
Answer: C


QUESTION 9
A NOC engineer needs to tune some prelogin parameters on an SSL VPN tunnel.

From the information that is shown, where should the engineer navigate to find the prelogin session attributes?
Exhibit:

A. "engineering" Group Policy
B. "contractor" Connection Profile
C. "engineer1" AAA/Local Users
D. DfltGrpPolicy Group Policy
Answer: B


QUESTION 10
A NOC engineer needs to tune some postlogin parameters on an SSL VPN tunnel. From the information shown, where should the engineer navigate to, in order to find all the postlogin session parameters?
Exhibit:

A. "engineering" Group Policy
B. "contractor" Connection Profile

C. DefaultWEBVPNGroup Group Policy
D. DefaultRAGroup Group Policy
E. "engineer1" AAA/Local Users
Answer: A


QUESTION 11
For the ABC Corporation, members of the NOC need the ability to select tunnel groups from a drop-down menu on the Cisco WebVPN login page. As the Cisco ASA administrator, how would you accomplish this task?
Exhibit:

A.Define a special identity certificate with multiple groups, which are defined in the certificate OU field, that will grant the certificate holder access to the named groups on the login page.
B.Under Group Policies, define a default group that encompasses the required individual groups that will appear on the login page.
C.Under Connection Profiles, define a NOC profile that encompasses the required individual profiles that will appear on the login page.
D.Under Connection Profiles, enable "Allow user to select connection profile."
Answer: D
QUESTION 12
A junior network engineer configured the corporate Cisco ASA appliance to accommodate a new

temporary worker. For security reasons, the IT department wants to restrict the internal network
access of the new temporary worker to the corporate server, with an IP address of 10.0.4.10. After the junior network engineer finished the configuration, an IT security specialist tested the account of the temporary worker. The tester was able to access the URLs of additional secure servers from the WebVPN user account of the temporary worker.
What did the junior network engineer configure incorrectly?
Exhibit:

A. The ACL was configured incorrectly.
B. The ACL was applied incorrectly or was not applied.
C. Network browsing was not restricted on the temporary worker group policy.
D. Network browsing was not restricted on the temporary worker user policy.

Answer: B
QUESTION 13
Your corporate finance department purchased a new non-web-based TCP application tool to run on one of its servers. Certain finance employees need remote access to the software during nonbusiness hours. These employees do not have "admin" privileges to their PCs. What is the correct way to configure the SSL VPN tunnel to allow this application to run?
A.Configure a smart tunnel for the application.
B. Configure a "finance tool" VNC bookmark on the employee clientless SSL VPN portal. C.Configure the plug-in that best fits the application.

D.Configure the Cisco ASA appliance to download the Cisco AnyConnect SSL VPN Client to the
finance employee each time an SSL VPN tunnel is established.

Answer: A
QUESTION 14
Which statement about plug-ins is false?
A. Plug-ins do not require any installation on the remote system.
B. Plug-ins require administrator privileges on the remote system.
C. Plug-ins support interactive terminal access.
D. Plug-ins are not supported on the Windows Mobile platform.

Answer: B
QUESTION 15
A temporary worker must use clientless SSL VPN with an SSH plug-in, in order to access the console of an internal corporate server, the projects.xyz.com server. For security reasons, the network security auditor insists that the temporary user is restricted to the one internal corporate server, 10.0.4.18. You are the network engineer who is responsible for the network access of the temporary user. What should you do to restrict SSH access to the one projects.xyz.com server?
A. Configure access-list temp_user_acl extended permit TCP any host 10.0.4.18 eq 22.
B. Configure access-list temp_user_acl standard permit host 10.0.4.18 eq 22.
C. Configure access-list temp_acl webtype permit url ssh://10.0.4.18.
D. Configure a plug-in SSH bookmark for host 10.0.4.18, and disable network browsing on the clientless SSL VPN portal of the temporary worker.

Answer: C
QUESTION 16
Authorization of a clientless SSL VPN defines the actions that a user may perform within a clientless SSL VPN session. Which statement is correct concerning the SSL VPN authorization process?
A. Remote clients can be authorized by applying a dynamic access policy, which is configured on an external AAA server.
B. Remote clients can be authorized externally by applying group parameters from an external database.

C. Remote client authorization is supported by RADIUS and TACACS+ protocols.
D. To configure external authorization, you must configure the Cisco ASA for cut-through proxy.

Answer: B
QUESTION 17
After adding a remote-access IPsec tunnel via the VPN wizard, an administrator needs to tune the IPsec policy parameters. Where is the correct place to tune the IPsec policy parameters in Cisco ASDM?
A. IPsec user profile
B. Crypto Map
C. Group Policy
D. IPsec Policy
E. IKE Policy

Answer: B
QUESTION 18
While troubleshooting a remote-access application, a new NOC engineer received the logging message that is shown in the exhibit. Which configuration is most likely to be mismatched?
Exhibit:

A. IKE configuration
B. extended authentication configuration
C. IPsec configuration
D. digital certificate configuration

Answer: C
QUESTION 19
The ABC Corporation is changing remote-user authentication from pre-shared keys to certificate-based authentication. For most employee authentication, its group membership (the employees) governs corporate access. Certain management personnel need access to more confidential

servers. Access is based on the group and name, such as finance and level_2. When it is time to
pilot the new authentication policy, a finance manager is able to access the department-assigned servers but cannot access the restricted servers.
As the network engineer, where would you look for the problem?
Exhibit:

A. Check the validity of the identity and root certificate on the PC of the finance manager.
B. Change the Management Certificate to Connection Profile Maps > Rule Priority to a number that is greater than 10.
C. Check if the Management Certificate to Connection Profile Maps > Rules is configured correctly.
D. Check if the Certificate to Connection Profile Maps > Policy is set correctly.

Answer: D
QUESTION 20
The user "contractor" inherits which VPN group policy?
Exhibit:


A. employee
B. management
C. DefaultWEBVPNGroup
D. DfltGrpPolicy
E. new_hire

Answer: D
QUESTION 21
In the CLI snippet that is shown, what is the function of the deny option in the access list?
Exhibit:

A. When set in conjunction with outbound connection-type bidirectional, its function is to prevent the specified traffic from being protected by the crypto map entry.
B. When set in conjunction with connection-type originate-only, its function is to instruct the Cisco ASA to deny specific inbound traffic if it is not encrypted.
C. When set in conjunction with outbound connection-type answer-only, its function is to instruct the Cisco ASA to deny specific outbound traffic if it is not encrypted.
D. When set in conjunction with connection-type originate-only, its function is to cause all IP traffic that matches the specified conditions to be protected by the crypto map.

Answer: A
QUESTION 22

A new NOC engineer, while viewing a real-time log from an SSL VPN tunnel, has a question about
a line in the log. The IP address 172.26.26.30 is attached to which interface in the network?
Exhibit:

A. the Cisco ASA physical interface
B. the physical interface of the end user
C. the Cisco ASA SSL VPN tunnel interface
D. the SSL VPN tunnel interface of the end user

Answer: B
QUESTION 23
When the user "contractor" Cisco AnyConnect tunnel is established, what type of Cisco ASA user restrictions are applied to the tunnel?
Exhibit:


A. full restrictions (no Cisco ASDM, no CLI, no console access)
B. full restrictions (no read, no write, no execute permissions)
C. full restrictions (CLI show commands and Cisco ASDM monitoring permissions only)
D. full access with no restrictions

Answer: D
QUESTION 24
Which statement regarding hashing is correct?
A. MD5 produces a 64-bit message digest.
B. SHA-1 produces a 160-bit message digest.
C. MD5 takes more CPU cycles to compute than SHA-1.
D. Changing 1 bit of the input to SHA-1 can change up to 5 bits in the output.

Answer: B
QUESTION 25
When initiating a new SSL or TLS session, the client receives the server SSL certificate and validates it. After validating the server certificate, what does the client use the certificate for?
A. The client and server use the server public key to encrypt the SSL session data.
B. The server creates a separate session key and sends it to the client. The client decrypts the session key by using the server public key.
C. The client and server switch to a DH key exchange to establish a session key.
D. The client generates a random session key, encrypts it with the server public key, and then sends it to the server.


Answer: D
QUESTION 26
When attempting to tunnel FTP traffic through a stateful firewall that might be performing NAT or PAT, which type of VPN tunneling should you use to allow the VPN traffic through the stateful firewall?
A. clientless SSL VPN
B. IPsec over TCP
C. smart tunnel
D. SSL VPN plug-ins

Answer: B
QUESTION 27
While troubleshooting on a remote-access VPN application, a new NOC engineer received the message that is shown. What is the most likely cause of the problem?
Exhibit:

A. The IP address that is assigned to the PC of the VPN user is not within the range of addresses that are assigned to the SVC connection.
B. The IP address that is assigned to the PC of the VPN user is in use. The remote user needs to select a different host address within the range.
C. The IP address that is assigned to the PC of the VPN user is in the wrong subnet. The remote user needs to select a different host number within the correct subnet.
D. The IP address pool for contractors was not applied to their connection profile.

Answer: D
QUESTION 28
What is a valid reason for configuring a list of backup servers on the Cisco AnyConnect VPN Client profile?
A. to access a backup authentication server
B. to access a backup DHCP server
C. to access a backup VPN server

D. to access a backup CA server

Answer: C
QUESTION 29
Which statement about CRL configuration is correct?
A. CRL checking is enabled by default.
B. The Cisco ASA relies on HTTPS access to procure the CRL list.
C. The Cisco ASA relies on LDAP access to procure the CRL list.
D. The Cisco Secure ACS can be configured as the CRL server.

Answer: C
QUESTION 30
You have been using pre-shared keys for IKE authentication on your VPN. Your network has grown rapidly, and now you need to create VPNs with numerous IPsec peers. How can you enable scaling to numerous IPsec peers?
A. Migrate to external CA-based digital certificate authentication.
B. Migrate to a load-balancing server.
C. Migrate to a shared license server.
D. Migrate from IPsec to SSL VPN client extended authentication.

Answer: A
QUESTION 31
When preconfiguring a Cisco AnyConnect profile for the user group, which file is output by the Cisco AnyConnect profile editor?
A. user.ini
B. user.html
C. user.pcf
D. user.xml
Answer: D
QUESTION 32

Which Cisco ASA SSL VPN feature provides support for PCI compliance by allowing for the validation of two sets of username and password credentials on the SSL VPN login page?
A. Single Sign-On
B. Certificate to Profile Mapping
C. Double Authentication
D. RSA OTP

Answer: C
QUESTION 33
In the Edit Certificate Matching Rule Criterion window, you want to change the Mapped to Connection Profile. However, you cannot perform that action from this window.
Where should you navigate to and what should you do, in order to perform this change?
Exhibit:

A. Edit the entry in the Certificate Management window.
B. Edit the entry in the Connection Profiles window.
C. Edit the entry in the Certificate to Connection Profile Maps window.

D. Edit the entry in IKE Policies window.
E. Delete this entry in the Mapping Criteria window, and add a new entry in the same location.

Answer: C
QUESTION 34
Which statement is correct regarding IKEv2 when implementing IPsec site-to-site VPNs?
A. IKEv2 should be configured with a higher priority over IKEv1 policies within the same tunnel group.
B. IKEv2 crypto maps can be configured to inherit IKEv1 parameters, if configured.
C. IKE v1 and IKEv2 can coexist in the same tunnel group, with fallback to IKEv1 if the remote endpoint does not support IKEv2.
D. IKEv2 can be configured to support multiple peers.

Answer: C
QUESTION 35
Which feature is supported when implementing an IPsec VPN configuration using IKEv2?
A. IKEv2 authentication can be configured to negotiate authentication modes within the IKE policy when using Cisco ASDM.
B. IKEv2 proposals are identical to IKEv1 policies.
C. When implementing IKEv2 with a site-to-site VPN, authentication parameters should contain a fallback to to PSKs, in case certificate-based authentication fails.
D. IKEv2 peer authentication can be implemented with asymmetric authentication methods.
Answer: D
QUESTION 36
What is the likely cause of the failure?
Exhibit:


A. A msgid of 0 signifies a zero payload, indicating that the peer did not send any IKE proposals.
B. The remote peer did not respond to the 11 notifications that were sent by the originating IPsec endpoint.
C. There are mismatched IKE policies.
D. There are mismatched tunnel groups.

Answer: C
QUESTION 37
When troubleshooting a site-to-site IPsec VPN deployment, you see a QM FSM message. What is the most likely cause of this message?
A. The Quick Mode timers have expired.
B. There are mismatched proxy identities.
C. Forward Secrecy Mode has failed.
D. IKE Phase 1 has failed authentication due to mismatched DH groups.

Answer: B
QUESTION 38
You are the network security administrator. You have received calls from site-to-site IPsec VPN users saying that they cannot connect into the network. In troubleshooting this problem, you discover that some sites can connect, but other sites cannot. It is not always the same sites experiencing problems. You suspect that the permitted number of simultaneous logins has been reached and needs to be increased. In which configuration window or tab should you accomplish this task?
Exhibit:


A. in the IKE Policies window
B. in the IKE Parameters window
C. in the System Options window
D. in the Device Management tab

Answer: C
QUESTION 39
Given the example that is shown, what can you determine?
Exhibit:


A. Users are required to perform RADIUS or LDAP authentication when connecting with the Cisco AnyConnect client.
B. Users are required to perform AAA authentication when connecting via WebVPN.
C. Users are required to perform double AAA authentication.
D. The user access identity is prefilled at login, requiring users to enter only their password.

Answer: C
QUESTION 40
You are the network security administrator. You receive a call from a user stating that he cannot log onto the network. In the process of troubleshooting, you determine that this user is accessing the network via certificate-based Cisco AnyConnect SSL VPN. What is a troubleshooting step that you should perform to determine the cause of the access problem?
A. Revoke and reissue the certificate, and have the user try again.
B. Verify that a connection can be made without using certificates.
C. Ask the user to use IPsec, and test the connection attempts.
D. Check the WebACLs on the Cisco ASA.

Answer: B
QUESTION 41
When deploying clientless SSL VPNs, what should you do to support external unmanaged VPN clients?
A. Deploy a private PKI service.
B. Issue self-signed identity certificates for the external clients that you wish to provide with access to your enterprise.
C. Configure policies specifically for the clients that have a group userID and password.
D. Implement a global PKI service.
Answer: D QUESTION 42

Which option limits a clientless SSL VPN user to specific resources upon successful login?
A. modify the Cisco ASA Modular Policy Framework access control
B. user-defined bookmarks
C. RADIUS authorization
D. disable portal features

Answer: B
QUESTION 43
Some users are having problems connecting via clientless SSL VPN, while other users are experiencing no problems. What is one possible cause of this issue?
A. The Cisco ASA identity certificates have not been generated.
B. SSL version checking is enabled, and clients are connecting with denied versions.
C. SSL VPN termination is not enabled.
D. The Cisco ASA identity certificate is not bound to the SSL interface.

Answer: B
QUESTION 44
You have just configured new clientless SSL VPN access parameters. However, when users connect, they are not getting the expected access that was configured. What is one possible reason this is occurring?
A. The correct Tunnel Group Lock is not properly set.
B. The corresponding Cisco ASA interface is not enabled for SSL VPN access.
C. The Connection Alias is not enabled.
D. Portal features are disabled.

Answer: A
QUESTION 45
When a VPN client that is using redundant peering and has obtained an IP address from the primary VPN gateway loses connection to that gateway, how is traffic rerouted?
A. The secondary VPN gateway automatically routes the traffic back to the client using the same IP address.

B. Redundant Internet routing protocols reroute the traffic to and from the client and the gateway.
C. Traffic flow stops, and the client must reestablish connection. Once connection is established, the same IP address is issued to the client and similarly routed.
D. The secondary VPN gateway issues the client a new IP address and routes traffic accordingly.

Answer: D
QUESTION 46
When configuring dead peer detection for remote-access VPN, what does the confidence level parameter represent?
A. It specifies the number of seconds the adaptive security appliance should allow a peer to idle before beginning keepalive monitoring.
B. It specifies the number of seconds to wait between IKE keepalive retries.
C. The higher the number, the more reliable the link is.
D. It is determined dynamically based on reliability, uptime, and load.

Answer: A
QUESTION 47
Which statement is true regarding Cisco ASA stateful failover?
A. It is recommended to share the failover link with the inside interface for security purposes.
B. The failover link is encrypted by default to protect eavesdropping.
C. VPN users must reauthenticate, even though the connection remains established.
D. Clientless features, such as smart tunnels and plug-ins, are not supported.
Answer: D
QUESTION 48
Which statement is true about configuring the Cisco ASA for Active/Standby failover?
A. All versions of Cisco ASA software need to have the same licensing on both devices.
B. Both devices perform load sharing until a failure occurs.
C. All VPN-related configurations and files are automatically replicated.
D. VPN images, profiles, and plug-ins must be manually provisioned to both devices.
Answer: D QUESTION 49

When configuring the Cisco ASA for VPN clustering, which IP address or addresses does the end-user device connect to?
A. It connects to individual device addresses of the cluster as provided in the connection profile.
B. It connects to the virtual address.
C. The virtual cluster manager sends the IP address of the least loaded device. The client then connects directly to that device.
D. The connection IP address is dependent upon whether the initiator is using SSL or IPsec.

Answer: B
QUESTION 50
You are the network security administrator troubleshooting a clientless SSL VPN issue. Users can connect using SSL VPN, but they cannot access file folder bookmarks that they need. Which problem could possibly cause this issue?
A. a name mismatch from the certificate CN and the VPN URL
B. misconfigured WebType ACLs
C. disabled content rewriting
D. disabled portal features

Answer: B
QUESTION 51
When an SSL VPN user, contractor1, enters https://192.168.4.2 (the outside address of the Cisco ASA appliance) into the browser, an SSL VPN Login screen appears. In addition to the information that is contained in the Cisco ASDM configuration screens, what can an administrator determine about the state of the connection after the user clicks the Login button?
Exhibit:


A. The user login will succeed, and an IP address of 10.0.4.120 will be assigned.
B. The user will be presented with a clientless VPN portal page.
C. The user login will succeed, but the user will be connected to the "contractor" tunnel group.
D. The login will fail.

Answer: D
QUESTION 52
As the administrator of a Cisco ASA security appliance for remote-access IPsec VPNs, you are assisting a user who has a digital certificate that is configured for the Cisco VPN Client. Based on the exhibit, what do you do to find the MD5 thumbprint of the "level_2" certificate?

Exhibit:

A. Choose the certificate, then click Status > Certificates from the menu bar.
B. Choose the certificate, then click the View button.
C. Choose the certificate, then click Options > Properties from the menu bar.
D. Choose the certificate, then click the Verify button.

Answer: B
QUESTION 53
When you are testing SSL VPN in a non-production environment, certain variables in the Cisco ASDM session details can be viewed or changed under Configuration > AnyConnect Connection Profiles. Which parameter can be viewed or changed in the AnyConnect Connection Profiles?
Exhibit:


A. Assigned IP address 10.0.1.50
B. Client TypE. SSL VPN Client
C. Authentication ModE. Certificate and User Password
D. Client Ver: Cisco AnyConnect VPN Agent for Windows

Answer: C
QUESTION 54
In a remote-access VPN solution, on which device or devices can dead peer detection be configured?
A. remote device
B. headend device
C. both headend and remote devices
D. Dead peer detection can be configured only on site-to-site VPN.
Answer: C
QUESTION 55
A Unified Communications Certificate is used on the Cisco ASA appliance to support which

option?
A. certificate + double AAA authentication
B. certificate + AAA authentication
C. certificate maps
D. Cisco ASA VPN clustering load balancing

Answer: D
QUESTION 56
In clientless SSL VPN, administrators can control user access to the internal network or resources of a company. What is this control based on?
A. interface ACLs
B. WebType ACLs
C. per-user or per-group ACLs
D. MPF-configured service policies

Answer: B
QUESTION 57
A new network engineer configured the ABC adaptive security appliance with two bookmarks for a new temporary worker. The temporary worker can connect to the administrator server via the temp_worker_admin bookmark but cannot connect to the project server via the temp_worker_projects bookmark (which is grayed out). It was determined that the URL and IP addressing information in the GUI screens is correct. What is wrong with the configuration?
Exhibit:


A. URL Entry should be enabled.
B. The File Server Entry Inherit parameter should be overwritten and set for enabled.
C. The DNS server information is incorrect.
D. File Server Browsing should be enabled.

Answer: C
QUESTION 58
You have configured two SSL VPN Certificate to Connection Profile Maps for all employee and management users. The Connection Profiles for the management users are not being applied when the "management" users connect. Based on the configuration that is shown, what is the most likely cause of this issue?
Exhibit:


A. The rule priority of the employee mapping is not low enough, and it needs to be lowered to 1.
B. The priority of the employee mapping is too low, and it needs to be increased, but not higher than the rule priority of the management mapping.
C. The priority of the management mapping is too high, and it needs to be lower than the rule priority of the employee mapping.
D. The matching criteria for the management mapping is too specific, and the CN matching parameter should be removed.

Answer: C
QUESTION 59
The ABC Corporation has a Cisco ASA in its test bed. A new network administrator is instructed to add a smart tunnel application to the existing configuration. The configuration will enable a "temp_worker" who is using Microsoft native RDP to have RDP access to server 10.0.4.4 only. Which statement is correct concerning the smart-tunnel configuration?
Exhibit:


A. The WebType access list is misconfigured.
B. The smart tunnel list parameter is misconfigured.
C. The smart tunnel group policy parameters are misconfigured.
D. The smart tunnel configuration is configured correctly.

Answer: D
QUESTION 60
Today was the first day on a new project for an offsite temporary worker at the XYZ Corporation. The worker was told to launch the SSL VPN session and then use the smart tunnel application to start a remote desktop application on the project server, projects_server.xyz.com. The worker looked at the portal screen that was provided, but she did not know how to access the smart tunnel application.

As the help desk person, what should you instruct the temporary worker to do?
Exhibit:

A. Click the Web Applications button.
B. Click the Applications Access button.
C. Click the Browse Networks button.
D. On the Home page, click the Address drop-down menu, choose RDP://, and fill in the destination host name, which is projects_server.abc.com.

Answer: B
QUESTION 61
After adding a remote-access IPsec tunnel via the VPN wizard, an administrator needs to tune the IKE policy parameters. Where is the correct place to tune IKE policy parameters?
A. Cisco IPsec VPN SW Client > Client Profile
B. IPsec User Profile
C. Group Policy
D. IKE Policy
E. Crypto Map
Answer: D
QUESTION 62
When deploying remote-access IPsec VPN tunnels, what is the key benefit of digital certificates?

A. resiliency
B. simplification
C. scalability
D. centralization

Answer: C
QUESTION 63
After being with the company for more than six months, Sue is no longer considered a new hire employee. In converting her from a new hire to a full-time employee, her SSL VPN address will change from the "Client requested address 10.0.4.120" to a random address from the employee address pool. To "disable" the 10.0.4.120 IP address, the network administrator should navigate to which Cisco ASDM pane?
Exhibit:

A. Connection Profile
B. Group Policies
C. Local Users
D. Address Pools

Answer: C
QUESTION 64

While configuring a new clientless SSL VPN group in Cisco ASDM, the administrator chooses to accept a number of the default parameter values. The administrator decides to view the actual value for the parameter, rather than just checking the inherit box. Under which default group can the administrator verify the default value for the group parameter?
A. DefaultRAGroup
B. DefaultWEBVPNGroup
C. DfltGrpPolicy
D. DefaultSVCGroup

Answer: C
QUESTION 65
SSL server-side authentication is used for a client to verify the identity of a server. This type of authentication is commonly used for servers that require secured transactions to protect user data or account information for online purchases. Which one of these steps is not a step in the authentication process?
A. The client sends Hello to the server, listing all of its supported cipher suites.
B. The server sends Hello to the client, listing all of its supported cipher suites.
C. The server sends its certificate to the client.
D. The client generates, encrypts, and sends a session key.
E. The server sends Change Cipher Spec to indicate a shift to encrypted mode.
Answer: B
QUESTION 66
If CRL checking is enabled on the Cisco ASA, where can the Cisco ASA find the CRL?
A. The Cisco ASA polls the CA for an updated list at a predefined rate.
B. The CA sends a CRL to the Cisco ASA directly at least once a week.
C. The CRL distribution point is listed on the identity certificate.
D. The CRL is sent out-of-band to the administrator at a negotiated rate, typically biweekly.
E. The CRL distribution point can be configured in the Connection Profile or Group Policy.
Answer: C
QUESTION 67
With SCEP enabled in a Cisco AnyConnect Connection Profile, what additional configuration step must you do when using Cisco ASA 8.4 software?

A. Configure local authentication prior to the enrollment process.
B. Configure the client to poll the CA for a response to the certificate request.
C. Configure the location of the CA server.
D. Configure the profile to inherit the SCEP forwarding URL.

Answer: C
QUESTION 68
After a remote user established a Cisco AnyConnect session from a wireless card through the Cisco ASA appliance of a partner to a remote server, the user opened the Cisco AnyConnect VPN Client Statistics Details screen. What are the two sources of the IP addresses that are marked A and B? (Choose two.)
Exhibit:


A. IP address that is assigned to the wireless Ethernet adapter of the remote user
B. IP address that is assigned to the remote user from the Cisco ASA address pool
C. IP address of the Cisco ASA physical interface of the partner
D. IP address of the Cisco ASA virtual HTTP server of the partner
E. IP address of the default gateway router of the remote user
F. IP address of the default gateway router of the partner
Answer: BC
QUESTION 69
In Cisco ASA Software Release 8.4.1, which three plug-ins are Cisco ASA-supported plug-ins?

(Choose three.)
A. SSH
B. TN3270
C. SCP
D. RDP
E. ICA
F. ARAP

Answer: ADE
QUESTION 70
To enable the Cisco ASA Host Scan with remediation capabilities, an administrator must have which two Cisco ASA licenses enabled on its security appliance? (Choose two.)
A. Cisco AnyConnect Premium license
B. Cisco AnyConnect Essentials license
C. Cisco AnyConnect Mobile license
D. Host Scan license
E. Advanced Endpoint Assessment license
F. Cisco Security Agent license

Answer: AE
QUESTION 71
An engineer, while working at a home office, wants to launch the Cisco AnyConnect Client to the corporate offices while simultaneously printing network designs on the home network. Without allowing access to the Internet, what are the two best ways for the administrator to configure this application? (Choose two.)
A. Select the Tunnel All Networks policy.
B. Select the Tunnel Network List Below policy.
C. Select the Exclude Network List Below policy.
D. Configure an exempted network list.
E. Configure a standard access list and apply it to the network list.
F. Configure an extended access list and apply it to the network list.
Answer: CE

QUESTION 72
ABC Corporation has hired a temporary worker to help out with a new project. The network administrator gives you the task of restricting the internal clientless SSL VPN network access of the temporary worker to one server with the IP address of 172.26.26.50 via HTTP. Which two actions should you take to complete the assignment? (Choose two.)
A. Configure access-list temp_acl webtype permit url http://172.26.26.50.
B. Configure access-list temp_acl_stand_ACL standard permit host 172.26.26.50.
C. Configure access-list temp_acl_extended extended permit http any host 172.26.26.50.
D. Apply the access list to the temporary worker Group Policy.
E. Apply the access list to the temporary worker Connection Profile.
F. Apply the access list to the outside interface in the inbound direction.

Answer: AD
QUESTION 73
In which three ways can a Cisco ASA security appliance obtain a certificate revocation list? (Choose three.)
A. FTP
B. SCEP
C. TFTP
D. HTTP
E. LDAP
F. SCP

Answer: BDE
QUESTION 74
An IT manager and a Security manager are discussing the deployment options for clientless SSL VPN. They are trying to decide which groups are best suited for this new deployment option. Which two groups are the best candidates for the clientless SSL VPN rollout? (Choose two.)
A. an IT administrator who needs to manage servers from a corporate laptop
B. employees who need occasional access to check their email accounts
C. a vendor who needs access to confidential corporate presentations via Secure FTP
D. customers who need interactive access to the corporate invoice server
Answer: BC QUESTION 75

Your corporation has contractors that need remote access to server desktops, in order to diagnose issues and load software during nonbusiness hours. Which three clientless SSL VPN configurations allow these contractors to access the desktops of remote servers? (Choose three.)
A. XWindows bookmark by using the XWindows plug-in
B. RDP bookmark by using the RDP plug-in
C. SCP bookmark by using SCP plug-in
D. VNC bookmark by using the VNC plug-in
E. SSH bookmark by using the SSH plug-in
F. Citrix plug-in by using the Citrix plug-in

Answer: BDF
QUESTION 76
Which three Host Scan checks on a remote endpoint can you configure Cisco Secure Desktop to perform? (Choose three.)
A. registry checks
B. user rights checks
C. group policy objects checks
D. file checks
E. virus software checks
F. process checks
Answer: ADF
QUESTION 77
Which three statements about clientless SSL VPN are true? (Choose three.)
A. Users are not tied to a particular PC or workstation.
B. Users have full application access to internal corporate resources.
C. Minimal IT support is required.
D. Cisco AnyConnect SSL VPN software is automatically downloaded to the remote user at the start of the clientless session.
E. For security reasons, browser cookies are disabled for clientless SSL VPN sessions.
F. Clientless SSL VPN requires an SSL-enabled web browser.

Answer: ACF

QUESTION 78
A remote user who establishes a clientless SSL VPN session is presented with a web page. The administrator has the option to customize the "look and feel" of the page. What are three components of the VPN Customization Editor? (Choose three.)
A. Application page
B. Logon page
C. Networking page
D. Logout page
E. Home page
F. Portal page

Answer: BDF
QUESTION 79
When establishing a Cisco AnyConnect SSL VPN tunnel, a system administrator wants to restrict remote home office users to either print to their local printer or send the remaining traffic down the Cisco AnyConnect SSL VPN tunnel (with restricted Internet access). Choose both a tunnel policy option and an ACL type to accomplish this design goal. (Choose two.)
A. tunnel all networks
B. tunnel network list below
C. exclude network list from the tunnel
D. standard ACL
E. web ACL
F. extended ACL

Answer: CD
QUESTION 80
The LAN-to-LAN tunnel is not established, but an administrator can ping the remote Cisco ASA. Which three IPsec LAN-to-LAN configuration parameters should the administrator verify at both ends of the tunnel? (Choose three.)
A. pre-shared key
B. extended authentication password
C. extended authentication username
D. crypto ACL source IP address

E. crypto ACL destination IP address
F. tunnel connection-typE. originate or answer

Answer: ADE
QUESTION 81
Upon receiving a digital certificate, what are three steps that a Cisco ASA performs to authenticate the digital certificate? (Choose three.)
A. The identity certificate validity period is verified against the system clock of the Cisco ASA.
B. The identity certificate thumbprint is validated using the private key of the stored CA.
C. The identity certificate signature is validated by using the stored root certificate.
D. The signature is validated by using the stored identity certificate.
E. If enabled, the Cisco ASA locates the CRL and validates the identity certificate.

Answer: ACE
QUESTION 82
You are configuring bookmarks for the clientless SSL VPN portal without the use of plug-ins. Which three bookmark types are supported? (Choose three.)
A. RDP
B. HTTP
C. FTP
D. CIFS
E. SSH
F. Telnet
Answer: BCD
QUESTION 83
What are three methods for VPN address assignment? (Choose three.)
A. RADIUS authentication server
B. Kerberos server
C. internal address pool
D. RSA SecureID authentication server
E. LDAP server


Answer: ACE
QUESTION 84
Datagram Transport Layer Security (DTLS) was introduced to solve performance issues. Choose three characteristics of DTLS. (Choose three.)
A. It uses TLS to negotiate and establish DTLS connections.
B. It uses DTLS to transmit datagrams.
C. It is disabled by default.
D. It uses TLS for data packet retransmission.
E. It replaces underlying transport layer with UDP 443.
F. It uses TLS to provide low-latency video application tunneling.

Answer: ABE
QUESTION 85
Which three options are characteristics of WebType ACLs? (Choose three.)
A. They are assigned per-connection profile.
B. They are assigned per-user or per-group policy.
C. They can be defined in the Cisco AnyConnect Profile Editor.
D. They support URL pattern matching.
E. They support implicit deny all at the end of the ACL.
F. They support standard and extended WebType ACLs.

Answer: BDE
QUESTION 86
For clientless SSL VPN users, bookmarks can be assigned to their portal. What are three methods for assigning bookmarks? (Choose three.)
A. connection profiles
B. group policies
C. XML profiles
D. LDAP or RADIUS attributes
E. the portal customization tool
F. user policies
Answer: BDF QUESTION 87

Your IT department needs to run a custom-built TCP application within the clientless SSL VPN tunnel. The network administrator suggests running the smart tunnel application. Which three statements concerning smart tunnel applications are true? (Choose three.)
A. They support active FTP and other RTSP-based applications.
B. They do not require administrator privileges on the remote system.
C. They require the enabling of port forwarding.
D. They are supported on Windows and MAC OS X platforms.
E. They support native client applications over SSL VPN.
F. They require the modification of the Host file on the end-user PC.

Answer: BDE
QUESTION 88
When deploying clientless SSL VPN advanced application access, the administrator needs to collect information about the end-user system. Which three input parameters of an end-user system are important for the administrator to identify? (Choose three.)
A. types of applications and application protocols that are supported
B. types of encryption that are supported on the end-user system
C. the local privilege level of the remote user
D. types of wireless security that are applied to the end-user tunnel interface
E. types of operating systems that are supported on the end-user system
F. type of antivirus software that is supported on the end-user system

Answer: ACE
QUESTION 89
Cisco Secure Desktop seeks to minimize the risks that are posed by the use of remote devices in establishing a Cisco clientless SSL VPN or Cisco AnyConnect VPN Client session. Which two statements concerning the Cisco Secure Desktop Host Scan feature are correct? (Choose two.)
A. It is performed before a user establishes a connection to the Cisco ASA.
B. It is performed after a user establishes a connection to the Cisco ASA but before logging in.
C. It is performed after a user logs in but before a group profile is applied.
D. It is supported on endpoints that run a Windows operating system only.
E. It is supported on endpoints that run Windows and MAC operating systems only.

F. It is supported on endpoints that run Windows, MAC, and Linux operating systems. Answer: BF
QUESTION 90
Which four statements about the Advanced Endpoint Assessment are correct? (Choose four.)
A. It examines the remote computer for personal firewall applications.
B. It examines the remote computer for antivirus applications.
C. It examines the remote computer for antispyware applications.
D. It examines the remote computer for malware applications.
E. It does not perform any remediation, but it provides input that can be evaluated by DAP records.
F. It performs active remediation by applying rules, activating modules, and providing updates where applicable.

Answer: ABCF
QUESTION 91
The software-based Cisco IPsec VPN Client solution uses bidirectional authentication, in which the client authenticates the Cisco ASA, and the Cisco ASA authenticates the user. Which three methods are software-based Cisco IPsec VPN Client to Cisco ASA authentication methods? (Choose three.)
A. Unified Client Certificate authentication
B. Secure Unit authentication
C. Hybrid authentication
D. Certificate authentication
E. Group authentication

Answer: CDE
QUESTION 92
Which two options are correct regarding IKE and IPv6 VPN support on the Cisco ASA using version 8.4? (Choose two.)
A. The Cisco ASA supports full IKEv2 IPv6 for site-to-site VPNs only.
B. The Cisco ASA supports full IKEv2 IPv6 for remote-access VPNs.
C. The Cisco ASA supports IKEv1 and IKEv2 configuration on the same crypto map.

D. The Cisco ASA supports negotiation of authentication type using IKEv2 with IPv6.
E. The Cisco ASA supports all types of VPN configurations when using IPv6

Answer: AC
QUESTION 93
In Cisco ASDM v6.4, what are four ways to implement single sign-on (SSO)? (Choose four.)
A. Use SSO for smart tunnels.
B. Use Kerberos SSO.
C. Use the HTTP Form protocol.
D. Use a dedicated SSO server.
E. Use SSO for application plug-ins.
F. Use auto sign-on for servers that do not require authentication credentials.

Answer: ACDE
QUESTION 94
An on-screen keyboard is a programmable SSL VPN option. Which three options are keyboard-configurable parameters that the administrator can enable or disable? (Choose three.)
A. Show only if Secure Desktop Vault is disabled.
B. Do not show onscreen keyboard.
C. Show only for the login page.
D. Show for all user input fields.
E. Show for all portal pages that require authentication.
F. Show for all plug-in pages.
Answer: BCE
QUESTION 95
Which three statements concerning keystroke logger detection are correct? (Choose three.)
A. It requires administrative privileges in order to run.
B. It runs on Windows and MAC OS X systems.
C. It detects loggers that run as a process or kernel module.
D. It detects both hardware-and software-based keystroke loggers.
E. It allows the administrator to define "safe" keystroke logger applications.


Answer: ACE
QUESTION 96
Cisco AnyConnect profiles can be used to set which three options? (Choose three.)
A. Define a list of VPN gateways that are presented to users upon login.
B. Define a quarantine VLAN for remote devices that fail a host scan.
C. Define a guest VLAN to all "noncompany" Cisco IOS WebVPN users.
D. Define a list of backup servers if primary gateways are unavailable.
E. Activate the SSL VPN tunnel as part of the Windows login sequence.
F. Configure the Cisco Secure Desktop vault.

Answer: ADE
QUESTION 97
Which two types of digital certificate enrollment processes are available for the Cisco ASA security appliance? (Choose two.)
A. LDAP
B. FTP
C. TFTP
D. HTTP
E. SCEP
F. Manual

Answer: EF
QUESTION 98
Which four parameters must be defined in an ISAKMP policy when you are creating an IPsec site-to-site VPN using the Cisco ASDM? (Choose four.)
A. encryption algorithm
B. hash algorithm
C. authentication method
D. IP address of remote IPsec peer
E. D-H group
F. perfect forward secrecy
Answer: ABCE QUESTION 99

Which two statements about the Cisco ASA cluster load-balancing feature are correct? (Choose two.)
A. The Cisco ASA load-balances both site-to-site and remote-access VPN tunnels.
B. The Cisco ASA load-balances remote-access VPN tunnels only.
C. The Cisco ASA load-balances IPsec VPN tunnels only.
D. The Cisco ASA load-balances IPsec VPN and Cisco AnyConnect SSL VPN tunnels only.
E. The Cisco ASA load-balances IPsec VPN, clientless, and Cisco AnyConnect SSL VPN tunnels.

Answer: BE
QUESTION 100
A Cisco AnyConnect user profile can be pushed to the PC of a remote user from a Cisco ASA. Which three user profile parameters are configurable? (Choose three.)
A. Backup Server list
B. DTLS Override
C. Auto Reconnect
D. Simultaneous Tunnels
E. Connection Profile Lock
F. Auto Update
Answer: ACF
QUESTION 101


Answer:

QUESTION 102


Answer:

QUESTION 103


Answer:

QUESTION 104


Answer:

QUESTION 105


Answer:

QUESTION 106


Answer:

QUESTION 107


Answer:

QUESTION 108


Answer:

QUESTION 109
The user, contractor1, will receive an IP address when the VPN connection is established. Which statement regarding the IP address is true?

Case Study Title (Case Study):
The user, contractor1, will receive an IP address when the VPN connection is established. Which statement regarding the IP address is true?
1 (exhibit):


2 (exhibit):

3 (exhibit):


A. Is sourced from the contractor pool
B. Is sourced from the employee pool
C. Is sourced from the engineering pool
D. Is sourced from the management pool
E. Is a dedicated address (10.0.4.1 20)

Answer: A
QUESTION 110 Case Study Title (Case Study):
Which group policy restricts the VPN user access to VLAN 100?
1 (exhibit):


2 (exhibit):

3 (exhibit):


A. Employee
B. Contractor
C. Management
D. Engineering

Answer: B
QUESTION 111 Case Study Title (Case Study):
Which connection profile supports SSL VPN Client access only.
1 (exhibit):


2 (exhibit):

3 (exhibit):


A. Employee
B. Contractor
C. Management
D. Engineering
E. New_hire

Answer: B
QUESTION 112 Case Study Title (Case Study):
After providing the correct VPN login credentials, user, contractor1, is enabled to use which VPN access type?
1 (exhibit):


2 (exhibit):

3 (exhibit):


A. Cisco Any Connect VPN
B. Clientless VPN
C. Cisco Any Connect VPN and clientless VPN
D. Cisco Any Connect VPN, clientless VPN, and IPsec VPN

Answer: C
QUESTION 113 Case Study Title (Case Study):
Upon logging in, user, emploeyee1, has two privileges: (Choose two)
A. Cisco ASDM, SSH, Telnet, and console access
B. CLI login prompt for SSH, Telnet, and console only
C. No Cisco ASDM, SSH, or console access
D. Level 15
E. Level 2
F. Level 3
Answer: DE

QUESTION 114 Case Study Title (Case Study):
The user, contractor1, receives an IP address when the VPN connection is established. Which statement regarding the IP address is true?
A. it is sourced from the contractor pool.
B. it is sourced from the employee pool.
C. it is sourced from the engineering pool.
D. it is sourced from the management pool.
E. it is dedicated address (10.0.4.120)
Answer: C