Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

300-730 Implementing Secure Solutions with Virtual Private Networks (SVPN) Questions and Answers

Questions 4

An engineer is configuring clientless SSL VPN. The finance department has a database server that only they should access, but the sales department can currently access it. The finance and the sales departments are configured as separate group-policies. What must be added to the configuration to make sure the users in the sales department cannot access the finance department server?

Options:

A.

tunnel group lock

B.

smart tunnel

C.

port forwarding

D.

webtype ACL

Buy Now
Questions 5

Which VPN technology minimizes the impact on VPN performance when encrypting multicast traffic on a Private WAN?

Options:

A.

DMVPN

B.

IPsec VPN

C.

FlexVPN

D.

GETVPN

Buy Now
Questions 6

Drag and drop the GETVPN components from the left onto the descriptions on the right.

Options:

Buy Now
Questions 7

Which command automatically initiates a smart tunnel when a user logs in to the WebVPN portal page?

Options:

A.

auto-upgrade

B.

auto-connect

C.

auto-start

D.

auto-run

Buy Now
Questions 8

Refer to the exhibit.

A customer cannot establish an IKEv2 site-to-site VPN tunnel between two Cisco ASA devices. Based on the syslog message, which action brings up the VPN tunnel?

Options:

A.

Reduce the maximum SA limit on the local Cisco ASA.

B.

Increase the maximum in-negotiation SA limit on the local Cisco ASA.

C.

Remove the maximum SA limit on the remote Cisco ASA.

D.

Correct the crypto access list on both Cisco ASA devices.

Buy Now
Questions 9

A second set of traffic selectors is negotiated between two peers using IKEv2. Which IKEv2 packet will contain details of the exchange?

Options:

A.

IKEv2 IKE_SA_INIT

B.

IKEv2 INFORMATIONAL

C.

IKEv2 CREATE_CHILD_SA

D.

IKEv2 IKE_AUTH

Buy Now
Questions 10

Which two parameters help to map a VPN session to a tunnel group without using the tunnel-group list? (Choose two.)

Options:

A.

group-alias

B.

certificate map

C.

optimal gateway selection

D.

group-url

E.

AnyConnect client version

Buy Now
Questions 11

Which statement about GETVPN is true?

Options:

A.

The configuration that defines which traffic to encrypt originates from the key server.

B.

TEK rekeys can be load-balanced between two key servers operating in COOP.

C.

The pseudotime that is used for replay checking is synchronized via NTP.

D.

Group members must acknowledge all KEK and TEK rekeys, regardless of configuration.

Buy Now
Questions 12

Drag and drop the correct commands from the night onto the blanks within the code on the left to implement a design that allow for dynamic spoke-to-spoke communication. Not all comments are used.

Options:

Buy Now
Questions 13

Which method dynamically installs the network routes for remote tunnel endpoints?

Options:

A.

policy-based routing

B.

CEF

C.

reverse route injection

D.

route filtering

Buy Now
Questions 14

Refer to the exhibit.

Which two tunnel types produce the show crypto ipsec sa output seen in the exhibit? (Choose two.)

Options:

A.

crypto map

B.

DMVPN

C.

GRE

D.

FlexVPN

E.

VTI

Buy Now
Questions 15

Which two changes must be made in order to migrate from DMVPN Phase 2 to Phase 3 when EIGRP is configured? (Choose two.)

Options:

A.

Add NHRP shortcuts on the hub.

B.

Add NHRP redirects on the spoke.

C.

Disable EIGRP next-hop-self on the hub.

D.

Enable EIGRP next-hop-self on the hub.

E.

Add NHRP redirects on the hub.

Buy Now
Questions 16

Refer to the exhibit.

The DMVPN tunnel is dropping randomly and no tunnel protection is configured. Which spoke configuration mitigates tunnel drops?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 17

On a FlexVPN hub-and-spoke topology where spoke-to-spoke tunnels are not allowed, which command is needed for the hub to be able to terminate FlexVPN tunnels?

Options:

A.

interface virtual-access

B.

ip nhrp redirect

C.

interface tunnel

D.

interface virtual-template

Buy Now
Questions 18

Refer to the exhibit.

DMVPN spoke-to-spoke traffic works, but it passes through the hub, and never sends direct spoke-to-spoke traffic. Based on the tunnel interface configuration shown, what must be configured on the hub to solve the issue?

Options:

A.

Enable NHRP redirect.

B.

Enable split horizon.

C.

Enable IP redirects.

D.

Enable NHRP shortcut.

Buy Now
Questions 19

Refer to the exhibit.

An IPsec Cisco AnyConnect client is failing to connect and generates these debugs every time a connection to an IOS headend is attempted. Which action resolves this issue?

Options:

A.

Correct the DH group setting.

B.

Correct the PFS setting.

C.

Correct the integrity setting.

D.

Correct the encryption setting.

Buy Now
Questions 20

Refer to the exhibit.

A network administrator is setting up a phone VPN on a Cisco ASA. The phone cannot connect and the error is presented in a debug on the Cisco ASA. Which action fixes this issue?

Options:

A.

Enable web-deploy of the posture module so that the module can be downloaded from the Cisco ASA to an IP phone.

B.

Configure the Cisco ASA to present an RSA certificate to the phone for authentication.

C.

Disable Cisco Secure Desktop under the connection profile VPNPhone.

D.

Install the posture module on the Cisco ASA.

Buy Now
Questions 21

Refer to the exhibit.

An engineer has configured a spoke to connect to a FlexVPN hub. The tunnel is up, but pings fail when the engineer attempts to reach host 192.168.200.10 behind the spoke, and traffic is sourced from host 192.168.100.3, which is behind the FlexVPN server. Based on packet captures, the engineer discovers that host 192.168.200.10 receives the icmp echo and sends an icmp reply that makes it to the inside interface of the spoke. Based on the output in the exhibit captured on the spoke by the engineer, which action resolves this issue?

Options:

A.

Add the aaa authorization group cert list default default command to the spoke ikev2 profile.

B.

Add the route set remote ipv4 192.168.200.0 255.255.255.0 command to the hub authorization policy.

C.

Add the aaa authorization group cert list default default command to the hub ikev2 profile.

D.

Add the route set remote ipv4 192.168.100.0 255.255.255.0 command to the spoke authorization policy.

Buy Now
Questions 22

Which feature allows a DMVPN Phase 3 spoke to switch to an alternate hub when the primary hub is unreachable?

Options:

A.

multicast PIM

B.

backup NHS

C.

per-tunnel jitter probes

D.

NHRP shortcut

Buy Now
Questions 23

Refer to the exhibit.

An engineer is troubleshooting a new GRE over IPsec tunnel. The tunnel is established but the engineer cannot ping from spoke 1 to spoke 2. Which type of traffic is being blocked?

Options:

A.

ESP packets from spoke2 to spoke1

B.

ISAKMP packets from spoke2 to spoke1

C.

ESP packets from spoke1 to spoke2

D.

ISAKMP packets from spoke1 to spoke2

Buy Now
Questions 24

An engineer is troubleshooting a new DMVPN setup on a Cisco IOS router. After the show crypto isakmp sa command is issued, a response is returned of "MM_NO_STATE." Why does this failure occur?

Options:

A.

The ISAKMP policy priority values are invalid.

B.

ESP traffic is being dropped.

C.

The Phase 1 policy does not match on both devices.

D.

Tunnel protection is not applied to the DMVPN tunnel.

Buy Now
Questions 25

Refer to the exhibit.

An SSL client is connecting to an ASA headend. The session fails with the message “Connection attempt has timed out. Please verify Internet connectivity.” Based on how the packet is processed, which phase is causing the failure?

Options:

A.

phase 9: rpf-check

B.

phase 5: NAT

C.

phase 4: ACCESS-LIST

D.

phase 3: UN-NAT

Buy Now
Questions 26

Refer to the exhibit.

A site-to-site tunnel between two sites is not coming up. Based on the debugs, what is the cause of this issue?

Options:

A.

An authentication failure occurs on the remote peer.

B.

A certificate fragmentation issue occurs between both sides.

C.

UDP 4500 traffic from the peer does not reach the router.

D.

An authentication failure occurs on the router.

Buy Now
Questions 27

Refer to the exhibit.

What is a result of this configuration?

Options:

A.

Spoke 1 fails the authentication because the authentication methods are incorrect.

B.

Spoke 2 passes the authentication to the hub and successfully proceeds to phase 2.

C.

Spoke 2 fails the authentication because the remote authentication method is incorrect.

D.

Spoke 1 passes the authentication to the hub and successfully proceeds to phase 2.

Buy Now
Questions 28

Refer to the exhibit.

Based on the debug output, which type of mismatch is preventing the VPN from coming up?

Options:

A.

interesting traffic

B.

lifetime

C.

preshared key

D.

PFS

Buy Now
Questions 29

Refer to the exhibit.

Client 1 cannot communicate with client 2. Both clients are using Cisco AnyConnect and have established a successful SSL VPN connection to the hub ASA. Which command on the ASA is missing?

Options:

A.

dns-server value 10.1.1.2

B.

same-security-traffic permit intra-interface

C.

same-security-traffic permit inter-interface

D.

dns-server value 10.1.1.3

Buy Now
Questions 30

Refer to the exhibit.

The IKEv2 site-to-site VPN tunnel between two routers is down. Based on the debug output, which type of mismatch is the problem?

Options:

A.

preshared key

B.

peer identity

C.

transform set

D.

ikev2 proposal

Buy Now
Questions 31

Refer to the exhibit.

Which type of mismatch is causing the problem with the IPsec VPN tunnel?

Options:

A.

crypto access list

B.

Phase 1 policy

C.

transform set

D.

preshared key

Buy Now
Questions 32

In a FlexVPN deployment, the spokes successfully connect to the hub, but spoke-to-spoke tunnels do not form. Which troubleshooting step solves the issue?

Options:

A.

Verify the spoke configuration to check if the NHRP redirect is enabled.

B.

Verify that the spoke receives redirect messages and sends resolution requests.

C.

Verify the hub configuration to check if the NHRP shortcut is enabled.

D.

Verify that the tunnel interface is contained within a VRF.

Buy Now
Questions 33

Refer to the exhibit.

The customer can establish a Cisco AnyConnect connection without using an XML profile. When the host "ikev2" is selected in the AnyConnect drop down, the connection fails. What is the cause of this issue?

Options:

A.

The HostName is incorrect.

B.

The IP address is incorrect.

C.

Primary protocol should be SSL.

D.

UserGroup must match connection profile.

Buy Now
Questions 34

Which parameter is initially used to elect the primary key server from a group of key servers?

Options:

A.

code version

B.

highest IP address

C.

highest-priority value

D.

lowest IP address

Buy Now
Questions 35

Cisco AnyConnect clients need to transfer large files over the VPN sessions. Which protocol provides the best throughput?

Options:

A.

SSL/TLS

B.

L2TP

C.

DTLS

D.

IPsec IKEv1

Buy Now
Questions 36

Which technology works with IPsec stateful failover?

Options:

A.

GLBR

B.

HSRP

C.

GRE

D.

VRRP

Buy Now
Questions 37

Refer to the exhibit.

Cisco AnyConnect must be set up on a router to allow users to access internal servers 192.168.0.10 and 192.168.0.11. All other traffic should go out of the client's local NIC. Which command accomplishes this configuration?

Options:

A.

svc split include 192.168.0.0 255.255.255.0

B.

svc split exclude 192.168.0.0 255.255.255.0

C.

svc split include acl CCNP

D.

svc split exclude acl CCNP

Buy Now
Questions 38

Which VPN solution uses TBAR?

Options:

A.

GETVPN

B.

VTI

C.

DMVPN

D.

Cisco AnyConnect

Buy Now
Questions 39

Which parameter must match on all routers in a DMVPN Phase 3 cloud?

Options:

A.

GRE tunnel key

B.

NHRP network ID

C.

tunnel VRF

D.

EIGRP split-horizon setting

Buy Now
Questions 40

What uses an Elliptic Curve key exchange algorithm?

Options:

A.

ECDSA

B.

ECDHE

C.

AES-GCM

D.

SHA

Buy Now
Questions 41

Which two commands help determine why the NHRP registration process is not being completed even after the IPsec tunnel is up? (Choose two.)

Options:

A.

show crypto isakmp sa

B.

show ip traffic

C.

show crypto ipsec sa

D.

show ip nhrp traffic

E.

show dmvpn detail

Buy Now
Questions 42

Which technology is used to send multicast traffic over a site-to-site VPN?

Options:

A.

GRE over IPsec on IOS router

B.

GRE over IPsec on FTD

C.

IPsec tunnel on FTD

D.

GRE tunnel on ASA

Buy Now
Questions 43

What are two functions of ECDH and ECDSA? (Choose two.)

Options:

A.

nonrepudiation

B.

revocation

C.

digital signature

D.

key exchange

E.

encryption

Buy Now
Questions 44

Refer to the exhibit.

All internal clients behind the ASA are port address translated to the public outside interface that has an IP address of 3.3.3.3. Client 1 and client 2 have established successful SSL VPN connections to the ASA. What must be implemented so that "3.3.3.3" is returned from a browser search on the IP address?

Options:

A.

Same-security-traffic permit inter-interface under Group Policy

B.

Exclude Network List Below under Group Policy

C.

Tunnel All Networks under Group Policy

D.

Tunnel Network List Below under Group Policy

Buy Now
Exam Code: 300-730
Exam Name: Implementing Secure Solutions with Virtual Private Networks (SVPN)
Last Update: Jun 15, 2025
Questions: 175
300-730 pdf

300-730 PDF

$33.25  $94.99
300-730 Engine

300-730 Testing Engine

$38.5  $109.99
300-730 PDF + Engine

300-730 PDF + Testing Engine

$50.75  $144.99