1.
Which cryptographic algorithms are a part of the Cisco NGE suite?
2.
Which transform set is contained in the IKEv2 default proposal?
3.
Which command clears all crypto configuration from a Cisco Adaptive Security Appliance?
4.
Which NGE IKE Diffie-Hellman group identifier has the strongest cryptographic properties?
5.
What is the Cisco recommended TCP maximum segment on a DMVPN tunnel interface when the MTU is set to 1400 bytes?
6.
Which technology does a multipoint GRE interface require to resolve endpoints?
7.
Which command configures IKEv2 symmetric identity authentication?
8.
Which option shows the correct traffic selectors for the child SA on the remote ASA, when the headquarter ASA initiates the tunnel?
9.
A rogue static route is installed in the routing table of a Cisco FlexVPN and is causing traffic to be blackholed. Which command should be used to identify the peer from which that route originated?
10.
The Cisco AnyConnect client fails to connect via IKEv2 but works with SSL. The following error message is displayed:
"Login Denied, unauthorized connection mechanism, contact your administrator"
What is the most possible cause of this problem?