exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 66 discussion

Actual exam question from Cisco's 350-701
Question #: 66
Topic #: 1
[All 350-701 Questions]


Refer to the exhibit. An engineer is implementing a certificate based VPN. What is the result of the existing configuration?

  • A. Only an IKEv2 peer that has an OU certificate attribute set to MANGLER establishes an IKEv2 SA successfully.
  • B. The OU of the IKEv2 peer certificate is used as the identity when matching an IKEv2 authorization policy.
  • C. The OU of the IKEv2 peer certificate is set to MANGLER.
  • D. The OU of the IKEv2 peer certificate is encrypted when the OU is set to MANGLER.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Smileebloke
Highly Voted 2 years, 9 months ago
B: Configuring the IKEv2 Name Mangler Perform this task to specify the IKEv2 name mangler, which is used to derive a name for authorization requests and obtain AAA preshared keys. The name is derived from specified portions of different forms of remote IKE identities or the EAP identity. enable configure terminal crypto ikev2 name-mangler mangler-name dn {common-name | country | domain | locality | organization | organization-unit | state} eap {all | dn {common-name | country | domain | locality | organization | organization-unit | state} | prefix | suffix {delimiter {. | @ | \}}} email {all | domain | username} fqdn {all | domain | hostname} end dn = Derives the name from any of the noted fields in the remote identity of type DN common-name country domain locality organization organization-unit state https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/xe-16-10/sec-flex-vpn-xe-16-10-book/sec-cfg-flex-serv.html=
upvoted 5 times
...
CyberGhost666
Most Recent 1 month, 3 weeks ago
Selected Answer: B
B. The OU of the IKEv2 peer certificate is used as the identity when matching an IKEv2 authorization policy.
upvoted 1 times
...
Marshpillowz
10 months, 1 week ago
Selected Answer: B
B is correct
upvoted 1 times
...
Naderelmansi
1 year, 10 months ago
Selected Answer: B
The correct answer is B. The "match identity certificate" command in the IKEv2 authorization policy is used to specify that the OU (Organizational Unit) attribute of the IKEv2 peer certificate should be used as the identity when matching the policy. The OU attribute is set to "MANGLER" in this case. So, when an IKEv2 peer with a certificate that has an OU attribute of "MANGLER" attempts to establish an IKEv2 SA, the router will use the OU attribute as the identity when matching the authorization policy. If the policy is a match, the SA will be established successfully.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...