多项选择题What are the DSL-specific factors that require additional bandwidth when supporting Voice-over-IP over an IPSec VPN?()

A.A voice packet is sent via multiple fixed-length cells; a portion of the last cell is padding, requiring more bandwidth.
B.ADSL typically uses PPPoE encapsulation, which adds additional overhead to each voice packet.
C.A voice packet is sent via multiple fixed-length cells; each cell has about 10% Layer-2 header overhead. 
D.IPSec requires additional overhead for the header and hash. 
E.ADSL carrier band requires additional bits to be carried over the wire to the DSL Access Concentrator.


您可能感兴趣的试卷

你可能感兴趣的试题

3.单项选择题

Refer to the exhibit. Available public Internet sites are sometimes used for estimating performance. Which statement regarding their use for estimating VPN performance is correct?()

A.Throughput results are valid as a value from the Teleworker's home to the corporate site, regardless of the location of the public test server. 
B.Throughput results may not be valid due to the public server's location on the Internet and fluctuations based on the use of the public server. 
C.Throughput values are not affected by the choice of split tunneling or Internet access through the VPN. 
D.Throughput results are unrelated to the Teleworker PC configuration or current PC use.

4.单项选择题What is the minimum recommended uplink/downlink speed to support a single encrypted IP voice Teleworker call?()

A.256kbps / 1024kbps
B.256kbps / 1544kbps
C.160kbps / 768kbps
D.384kbps / 384kbps
E.128kbps / 512kbps

5.单项选择题For best packet switching performance with crypto, what is the recommend packet switching path in a Cisco Teleworker Router?()

A.Process Switching
B.Silicon Switching 
C.Cisco Express Forwarding (CEF) Switching
D.Autonomous Switching

6.单项选择题When implementing 802.1X on Teleworker routers and using separate DHCP address pools for Teleworker and Home-user devices, traffic between devices can be restricted. How can you best accomplish this?()

A.Access Lists between the inside interface and loopback interface
B.Context Based Access Control
C.Dynamic Host Configuration Protocol
D.Network Address translation

7.单项选择题

Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is _____.()

A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router 
D.Cisco VPN3002 Hardware Client
E.Cisco SW VPN Client

8.单项选择题What method in a Cisco IOS router can confirm that packets marked for a particular QoS marking are being matched?()

A.Issue a show policy-map interface command. 
B.Assuming Netflow is enabled, issue a show ip cache verbose flow command.
C.Issue a show crypto ipsec session command.
D.Issue a debug qos set command and a terminal monitor command.

9.单项选择题An important limitation of the Cisco Business Ready Teleworker solution is_____.()

A.IP phone extensions for teleworkers must be chosen carefully so not to duplicate campus phone extensions.
B.More security exposure exists due to lack of support for Intrusion Detection System and URL filtering for teleworker originated traffic.
C.Compressed RTP and IPSec are not compatible and result in no bandwidth savings.
D.Broadband modems must support Quality of Service for adequate voice quality.

10.单项选择题

Refer to the exhibit. The Linksys router in the diagram is performing pNAT (port network address translation). What hash algorithm should you choose and why?()

A.Use hash MD5 to ensure that IKE works through NAT. 
B.Use ah-sha-hmac, as it does not check the integrity of the IP header. The IP header will change due to NAT. 
C.Use 3DES, as it will encrypt the IPSec header IP addresses and bypass addressing issues. 
D.Use esp-sha-hmac, as it does not check the integrity of the IP header. The IP header will change due to NAT.

最新试题

A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()

题型:单项选择题

What are disadvantages of Network Address Translation Transparency?()

题型:多项选择题

Choose the false statement concerning the use of CiscoWorks Internetwork Performance Monitor (IPM) in a Teleworker deployment.()

题型:单项选择题

Refer to the exhibit. Given the interface configuration on a DSL connection with PPPoE, select the true statement.()

题型:单项选择题

Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()

题型:单项选择题

A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()

题型:单项选择题

An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()

题型:单项选择题

Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()

题型:单项选择题

What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()

题型:多项选择题

When IP Telephony is deployed for Teleworkers using the Cisco Business Ready Teleworker solution, which statements are true?()

题型:多项选择题