Exam Logo

Cisco (300-730-SVPN) Exam Questions And Answers page 3

What are two functions of ECDH and ECDSA? (Choose two.)
Implement and Troubleshoot Secure Communications Secure Communications Architectures and Solutions

Refer to the exhibit. Which type of VPN implementation is displayed?
Secure Solutions with Virtual Private Networks
Which command is used to troubleshoot an IPv6 FlexVPN spoke-to-hub connectivity failure?
Implement and Troubleshoot Secure Communications Secure Communications Architectures and Solutions
Which requirement is needed to use local authentication for Cisco AnyConnect Secure Mobility Clients that connect to a FlexVPN server?
Architecture and Design Implement and Troubleshoot Secure Communications
A company's remote locations connect to the data centers via MPLS. A new request requires that unicast and multicast traffic that exits in the remote locations be encrypted. Which non-tunneled technology should be used to satisfy this requirement?
Implement and Troubleshoot Secure Communications Secure Communications Architectures and Solutions
Which IKE identity does an IOS/IOS-XE headend expect to receive if an IPsec Cisco AnyConnect client uses default settings?
Implement and Troubleshoot Secure Communications Infrastructure Security
What is a requirement for smart tunnels to function properly?
Implement and Troubleshoot Secure Communications Secure Communications Architectures and Solutions

Refer to the exhibit. An engineer is troubleshooting a new GRE over IPsec tunnel. The tunnel is established, but the engineer cannot ping from spoke 1 to spoke 2. Which type of traffic is being blocked?
Implement and Troubleshoot Secure Communications Secure Communications Architectures and Solutions
Drag and drop the correct commands from the right onto the blanks within the code on the left to implement a design that allow for dynamic spoke-to-spoke communication. Not all commands are used.

Architecture and Design Implement and Troubleshoot Secure Communications
In a FlexVPN deployment, the spokes successfully connect to the hub, but spoke-to-spoke tunnels do not form. Which troubleshooting step solves the issue?
Architecture and Design Implement and Troubleshoot Secure Communications