Home
51.
If you were working in IOS command - line interface, in a single command, what could you do to determine the interesting traffic for a particular VPN tunnel?
  • A.
    show interesting traffic
  • B.
    show access - list
  • C.
    show crypto map
  • D.
    show ip interface
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The show crypto map command displays all components of the crypto map, including the access list that controls interesting traffic. Note: Option B could be used if you knew which access list was related to the crypto map.
Report
Name Email  
52.
What is the " peer address " when discussing a VPN tunnel?
  • A.
    The remote device VPN endpoint
  • B.
    The interesting traffic
  • C.
    The local outside interface
  • D.
    The remote end loopback address
  • Answer & Explanation
  • Report
Answer : [E]
Explanation :
The peer address is the remote endpoint of the VPN device to which you are connecting.
Report
Name Email  
53.
True or False? You can have only one transform set to define the type of authentication and encryption.
  • A.
    True
  • B.
    False
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :

When defi ning VPN tunnels to different business partners and sites, it's often advantageous to have different transform sets to describe what parameters you are using with each partner.

Report
Name Email  
54.
What is split tunneling?
  • A.
    A dual tunnel to two locations
  • B.
    The ability to access both local resources and those over the VPN
  • C.
    The ability to access only remote locations
  • D.
    None of the above
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Split tunneling is the ability for a remote VPN client to be able to access resources across the VPN tunnel and also those on the local network.
Report
Name Email  
55.
Name a debug command that's commonly used when troubleshooting VPN connectivity. (Choose all that apply.)
  • A.
    debug ip
  • B.
    debug crypto isakmp
  • C.
    debug crypto ipsec
  • D.
    debug vpn
  • Answer & Explanation
  • Report
Answer : [B, C]
Explanation :
The two used in the chapter that were described are debug crypto isakmp and debug crypto isakmp .
Report
Name Email