单项选择题An Enterprise customer is concerned about the effort involved in allocating remote network addressing at the Teleworker location. What should you recommend to the customer?()

A.CiscoWorks VPN Manager
B.Easy VPN client mode
C.deploy Linksys routers with menu driven configuration
D.disable 802.1x and Auth Proxy on the Teleworker router


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题Which statement regarding 802.1X is true?()

A.802.1X is simple to implement on any workstation.
B.802.1X requires access-lists to allow IP voice traffic across.
C.Authentication is initiated when the workstation connects to an Ethernet port.
D.802.1X requires HTTP access to initiate authentication.

2.单项选择题

Refer to the exhibit. Given the DHCP pool configuration shown on Router A, the Cisco IP phone will not boot up in the Teleworker location. What is missing from the Teleworker DHCP pool configuration?()

A.The DHCP pool needs to have an import all statement. 
B.The DHCP pool is missing an option 150 ip 10.59.138.1 statement.
C.The DHCP pool is missing an option 139 ip 10.59.138.1 statement
D.The DHCP pool is missing a dns-server 10.59.138.1 statement.

3.单项选择题

Refer to the exhibit. Select the true statement.()

A.The interval value should be configured at 150ms since that is target latency budget.
B.This router never delayed any packets.
C.This router is provisioned for a 256K DSL link.
D.The inside LAN interface is Ethernet 0/0.

4.单项选择题An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()

A.Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.
B.Configure pNAT to ensure Voice over IP packets are properly translated.
C.Configure IOS firewall to permit RTP port numbers through the firewall via VPN. 
D.Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.

5.多项选择题When IP Telephony is deployed for Teleworkers using the Cisco Business Ready Teleworker solution, which statements are true?()

A.There is lower bandwidth consumption for VoIP media streams.
B.Teleworkers can have the same extensions and inward-dialing numbers at their office desks and home offices.
C.Personal calls are routed directly through the residential PSTN line.
D.Teleworkers can have different extensions at their office desks and home offices.
E.There is less burden on Cisco CallManager for signaling traffic.
F.Incoming calls are first routed to the office desks, then to the home offices.

6.多项选择题What characteristics make ADSL the likely choice among DSL technologies for Teleworker?()

A.most widely deployed by service providers 
B.provides asymmetrical bandwidth, including high speed downlink
C.data rate is affected by distance to the Central Office
D.provides the furthest reach at T1 speeds 
E.supports connection of two routers without the use of a DSL access concentrator

7.单项选择题When is an IPSec SA built on the Teleworker Router?()

A.when the router is booted up
B.when the router administratively does a no shutdown" on the IPSec SA 
C.when traffic matches a line of the access-list tied into the crypto-map in the router configuration, and that particular IPSec SA is not already up 
D.when the ISAKMP SA completes negotiation of all IPSec SAs (one per access-list line in the crypto ACL), it will be brought up immediately

8.单项选择题A customer wants to deploy the Cisco Business Ready Teleworker solution, but is currently using a traditional (non-IP) PBX for voice services. What would you recommend to this customer?()

A.Deployment of Business Ready Teleworker with VoIP is not recommended.
B.The customer’s existing PBX must first be replaced with Cisco IP Telephony solution.
C.Business Ready Teleworker and Cisco IP Telephony can be deployed in parallel to the existing PBX, integrating the two with trunking.
D.Deployment is recommended only for full-time Teleworkers who have no other corporate phone.

9.单项选择题What is not a difference between VPN tunnel authentication and per-user authentication?()

A.VPN tunnel authentication is part of the IKE specification. 
B.VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
C.User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
D.802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

10.单项选择题Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()

A.Inbound packets are permitted only if they are part of a legitimate data flow initiated by a device on the Teleworker home network.
B.All packets are checked for integrity by analyzing their checksum.
C.Every packet is checked to see if it was sent through the VPN tunnel.
D.Every packet is inspected to see if any disallowed URLs are included. URLs are forwarded to the security cache engine for authorization.

最新试题

Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()

题型:单项选择题

What is not a difference between VPN tunnel authentication and per-user authentication?()

题型:单项选择题

What are disadvantages of Network Address Translation Transparency?()

题型:多项选择题

Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()

题型:单项选择题

Which is not a reason that Internet Service Providers prefer to use PPP over Ethernet (PPoE)?()

题型:单项选择题

Refer to the exhibit. Given the DHCP pool configuration shown on Router A, the Cisco IP phone will not boot up in the Teleworker location. What is missing from the Teleworker DHCP pool configuration?()

题型:单项选择题

What are the DSL-specific factors that require additional bandwidth when supporting Voice-over-IP over an IPSec VPN?()

题型:多项选择题

Which statement regarding 802.1X is true?()

题型:单项选择题

Refer to the exhibit. Given the topology shown, what are two ways to allow the VPN to operate?()

题型:多项选择题

Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()

题型:单项选择题