多项选择题What characteristics make ADSL the likely choice among DSL technologies for Teleworker?()

A.most widely deployed by service providers 
B.provides asymmetrical bandwidth, including high speed downlink
C.data rate is affected by distance to the Central Office
D.provides the furthest reach at T1 speeds 
E.supports connection of two routers without the use of a DSL access concentrator


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题When is an IPSec SA built on the Teleworker Router?()

A.when the router is booted up
B.when the router administratively does a no shutdown" on the IPSec SA 
C.when traffic matches a line of the access-list tied into the crypto-map in the router configuration, and that particular IPSec SA is not already up 
D.when the ISAKMP SA completes negotiation of all IPSec SAs (one per access-list line in the crypto ACL), it will be brought up immediately

2.单项选择题A customer wants to deploy the Cisco Business Ready Teleworker solution, but is currently using a traditional (non-IP) PBX for voice services. What would you recommend to this customer?()

A.Deployment of Business Ready Teleworker with VoIP is not recommended.
B.The customer’s existing PBX must first be replaced with Cisco IP Telephony solution.
C.Business Ready Teleworker and Cisco IP Telephony can be deployed in parallel to the existing PBX, integrating the two with trunking.
D.Deployment is recommended only for full-time Teleworkers who have no other corporate phone.

3.单项选择题What is not a difference between VPN tunnel authentication and per-user authentication?()

A.VPN tunnel authentication is part of the IKE specification. 
B.VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
C.User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
D.802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

4.单项选择题Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()

A.Inbound packets are permitted only if they are part of a legitimate data flow initiated by a device on the Teleworker home network.
B.All packets are checked for integrity by analyzing their checksum.
C.Every packet is checked to see if it was sent through the VPN tunnel.
D.Every packet is inspected to see if any disallowed URLs are included. URLs are forwarded to the security cache engine for authorization.

5.单项选择题

Refer to the exhibit. Given the interface configuration on a DSL connection with PPPoE, select the true statement.()

A.The router is limiting the size of TCP and UDP packets. 
B.The configuration implements an effective Layer-2 fragmentation technique.
C.The value of 542 is recommended in several RFCs. 
D.There is another upstream router terminating the PPPoE session.

6.多项选择题For Ethernet-to-Ethernet routers, such as the Cisco 831 behind a cable modem or DSL bridge, a traffic shaper is configured. This is required since the output 10-Mbps interface will not be congested. Which two statements are true?()

A.The parent policy-map shapes and the child policy-map queues.
B.The mean-rate and burst-size must always be the same value.
C.This will not work without a Dialer interface configured.
D.The shaper provides congestion feedback.

7.单项选择题

Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()

A.The remote router would load-balance between peer x.x.x.x and x.y.y.y.
B.Peer x.x.x.x would be attempted first.
C.A round-robin selection is implemented. 
D.If the first peer in the list does not respond in 50 milliseconds, the second peer would be selected.
E.There is no pre-determined order of selection.

8.多项选择题What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()

A.all traffic is encrypted using IPSec and the Triple-DES algorithm
B.full support for all Enterprise applications, including data, voice, and video
C.thousands of Teleworker VPN tunnels can be aggregated to a headquarters location
D.the VPN tunnel is an always on site-to-site VPN connection
E.portability for use while traveling
F.used with broadband Cable/DSL subscriptions

9.单项选择题

Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()

A.ip dhcp pool Client
B.network 10.1.1.0 255.255.255.240
C.default-router 10.1.1.1
D.dns-server 10.2.2.2
E.domain-name cisco.com
F.option 150 ip 10.3.3.3

10.单项选择题Choose the false statement concerning the use of CiscoWorks Internetwork Performance Monitor (IPM) in a Teleworker deployment.()

A.IPM should not be run on a production network. 
B.IPM helps verify if a Service Provider is meeting the Service Level Agreement. 
C.IPM contains a database that can store data on latency, jitter, and drops of voice packets over a period of weeks or months. 
D.The QoS service policy should contain an allocation of sufficient bandwidth in the priority queue (LLQ) for both the SAA probe simulating a voice call and the voice call. If not, voice quality will suffer.

最新试题

Refer to the exhibit. Select the true statement.()

题型:单项选择题

Choose the false statement concerning the use of CiscoWorks Internetwork Performance Monitor (IPM) in a Teleworker deployment.()

题型:单项选择题

It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()

题型:单项选择题

When IP Telephony is deployed for Teleworkers using the Cisco Business Ready Teleworker solution, which statements are true?()

题型:多项选择题

Which statement regarding 802.1X is true?()

题型:单项选择题

An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()

题型:单项选择题

Refer to the exhibit. Easy VPN operates in two modes. The exhibit represents network extension mode. Choose the best reason for using this mode.()

题型:单项选择题

Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()

题型:单项选择题

When is it appropriate to enable Link Fragmentation and Interleaving (LFI) on DSL connections for Teleworkers?()

题型:多项选择题

Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()

题型:单项选择题