单项选择题It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()

A.IPSec
B.IPSec with GRE
C.DMVPN
D.EZVPN
E.all of the choices


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题

Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()

A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router
D.Cisco VPN3002 Hardware Client
E.Cisco ubr925 cable modem
F.Cisco SW VPN Client

2.多项选择题

Refer to the exhibit. Given the topology shown, what are two ways to allow the VPN to operate?()

A.Use route maps on the 831
B.The 831 has IPSec NAT-Transparency (NAT-T) enabled
C.Disallow split tunneling on the 831
D.IPSec pass-through must be enabled on the Linksys
E.Use the port-mapping feature on the residential router

3.单项选择题An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()

A.CiscoWorks VPN Manager 
B.deploy Linksys routers with menu-driven configuration
C.Easy VPN client mode 
D.disable 802.1x and Auth Proxy on the Teleworker router

4.单项选择题In a Teleworker deployment with a single IP phone connected to a Cisco 831 router, select the true statement regarding Call Admission Control.()

A.RSVP is a required configuration to support conference calls without voice packet loss. 
B.The QoS configuration on the 831 router must always provision sufficient bandwidth for two RTP streams. 
C.Call admission control is an issue only when using hardware DSP resources. 
D.When using the conference call features on a 7960 IP phone, only one RTP stream is present regardless of how many extensions are on the conference.

5.单项选择题

Refer to the exhibit. Given this deployment model, what capability must the Broadband Router provide for the Enterprise applications to function properly?()

A.IPSec tunnel termination
B.DHCP
C.hardware-accelerated IPSec encryption
D.Traffic Shaping
E.Split-tunneling

6.单项选择题A customer wants to TFTP a new image from the corporate network to Flash on the Teleworker router through the IPSec tunnel. How should you configure the Teleworker router?()

A.No additional steps are required. 
B.Add the appropriate source-interface command. 
C.The router cannot access a server in the Enterprise Campus network. 
D.The Teleworker Router does not have any client applications; therefore this type of request is not possible.

7.多项选择题

Refer to the exhibit. Given this DSL router's sub-interface configuration, select the two true statements. Assume the interface is UP/UP.()

A.The interface must be configured as point-to-multipoint
B.The sustained cell rate and the burst rate are equal
C.The router's configuration will also include a Dialer interface
D.The configuration must also include a sub-interface with a VPI/VCI of 8/35

8.单项选择题

Refer to the exhibit. Which statement is true regarding the topology?()

A.An IPSec tunnel cannot be established between Router A and Router B
B.The Linksys Firewall router does not support PPPoE
C.Destination addresses defined in RFC 1918 are not supported within an IPSec tunnel
D.The phone and PC behind Router A will not be able to connect to a host on 192.168.1.0/24

9.单项选择题

Refer to the exhibit. Easy VPN operates in two modes. The exhibit represents network extension mode. Choose the best reason for using this mode.()

A.Teleworker devices must be accessed from the central site (server, printers).
B.IP addressing is simplified. 
C.The Teleworker LAN is a transit networking for routing.
D.The Teleworker router is an MPLS PE node.

10.多项选择题What are disadvantages of Network Address Translation Transparency?()

A.There is no disadvantage.
B.It will add 16 bytes per packet of overhead(8 bytes UDP header, and 8 bytes of NON-IKE Marker).
C.It will add 36 bytes per packet of overhead (20 bytes of IP header, 8 bytes of UDP header, 8 bytes of NON-IKE Marker).
D.It will require that both crypto peers support this feature in the IOS version. Both crypto peers must also have this feature enabled.

最新试题

In a Teleworker deployment with a single IP phone connected to a Cisco 831 router, select the true statement regarding Call Admission Control.()

题型:单项选择题

An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()

题型:单项选择题

Which statement regarding 802.1X is true?()

题型:单项选择题

What are the DSL-specific factors that require additional bandwidth when supporting Voice-over-IP over an IPSec VPN?()

题型:多项选择题

Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()

题型:单项选择题

Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()

题型:单项选择题

What characteristics make ADSL the likely choice among DSL technologies for Teleworker?()

题型:多项选择题

It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()

题型:单项选择题

Refer to the exhibit. Given the topology shown, what are two ways to allow the VPN to operate?()

题型:多项选择题

Refer to the exhibit. Which statement is true regarding the topology?()

题型:单项选择题