A.Extranet VPN B.Managed overlay VPN topology C.Hub-and-spoke VPN topology D.Central-site VPN topology E.Full mesh VPN topology F.Remote-access VPN topology
A. Prepare, Plan, Design, Apply, Operate, and Manage B. Prepare, Plan, Design, Implement, Operate, and Optimize C. Prepare, Plan, Design, Implement, Operate and Manage D. Prepare, Plan, Create, Implement, Operate, and Improve
A. Cisco ISR Routers with the Enhanced Security Bundles support WebVPN. B. Cisco security appliances act as a proxy between the end user and the target web server. C. Cisco PIX Security Appliances (running release 7.0) and Adaptive Security Appliances both support WebVPN. D. Cisco’s WebVPN solution supports both TCP and UDP port forwarding for legacy application support.
A.Call Home Service Profiles B.Call Home Policies C.Call Home Events D.Call Home Traps
A. probe request/response, authentication request/response, association request/response B. association request/response, authentication request/response, probe request/response C. probe request/response, association request/response, authentication request/response D. association request/response, probe request/response, authentication request/response
A. all interfaces in the path toward the destination B. all networks in the path toward the destination C. adjacent next hop router in the path toward the destination D. all routers in the path toward the destination E. all interfaces through which the packets can be routed F. type of service and precedence in the IP packets
A. Proxy ARP B. HSRP C. IRDP D. VRRP E. GLBP
A.16 feet [4.8 meters] B.24 feet [7.3 meters] C.8 feet [2.4 meters] D.40 feet [12.1 meters]
A.10/100 Mbps RJ45 B.1000BASE-SX SFP C.10/100/1000 Mbps RJ45 D.10000BASE-SX
A. provides loop-free technology B. manages additional routing peers C. provides HSRP/VRRP D. manages two nodes and configuration