- Home
- Networking
- CCNA Security
51.
If you were working in IOS command - line interface, in a single command, what could you
do to determine the interesting traffic for a particular VPN tunnel?
- A.show interesting traffic
- B.show access - list
- C.show crypto map
- D.show ip interface
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
The show crypto map command displays all components of the crypto map, including the access list that controls interesting traffic. Note: Option B could be used if you knew which access list was related to the crypto map. |
52.
What is the " peer address " when discussing a VPN tunnel?
- A.The remote device VPN endpoint
- B.The interesting traffic
- C.The local outside interface
- D.The remote end loopback address
- Answer & Explanation
- Report
Answer : [E]
Explanation :
Explanation :
The peer address is the remote endpoint of the VPN device to which you are connecting. |
53.
True or False? You can have only one transform set to define the type of authentication and
encryption.
- A.True
- B.False
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
When defi ning VPN tunnels to different business partners and sites, it's often advantageous to have different transform sets to describe what parameters you are using with each partner. |
54.
What is split tunneling?
- A.A dual tunnel to two locations
- B.The ability to access both local resources and those over the VPN
- C.The ability to access only remote locations
- D.None of the above
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Split tunneling is the ability for a remote VPN client to be able to access resources across the VPN tunnel and also those on the local network. |
55.
Name a debug command that's commonly used when troubleshooting VPN connectivity.
(Choose all that apply.)
- A.debug ip
- B.debug crypto isakmp
- C.debug crypto ipsec
- D.debug vpn
- Answer & Explanation
- Report
Answer : [B, C]
Explanation :
Explanation :
The two used in the chapter that were described are debug crypto isakmp and debug crypto isakmp . |