Which two cryptographic technologies are recommended for use with FlexVPN? (Choose two.)
Which command configures IKEv2 symmetric identity authentication?
Which two examples of transform sets are contained in the IKEv2 default proposal? (Choose two.)
What is the default storage location of user-level bookmarks in an IOS clientless SSL VPN?
Which command will prevent a group policy from inheriting a filter ACL in a clientless SSL VPN?
Which two are characteristics of GETVPN? (Choose two.)