多項選擇題Users of a site-to-site VPN are reporting performance problems. The VPN connection employs IPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem?()

A. Employ path MTU discovery.
B. Set the MTU higher than 1500 bytes.
C. Turn off pre-fragmentation for IPSec.
D. Set the MTU value to 1400 bytes.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Which of these terms refers to call issues that cause variations in timing or time of arrival?()

A.queuing
B.jitter
C.packet loss
D.digitized sampling
E.signal-to-noise ratio ratio

2.多項選擇題

Refer to the exhibit. Which two of these are correct regarding the recommended practice for distribution layer design?()

A.use a redundant link to the core
B.use a Layer 2 link between distribution switches
C.never use a redundant link to the core because of convergence issues
D.use a Layer 3 link between distribution switches with route summarization
E.use a Layer 3 link between distribution switches without route summarization

3.單項選擇題You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientless end-user devices?()

A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.

4.多項選擇題What are two design guidelines for VoIP networks? ()

A.Delay should be no more than 10 ms.
B.Loss should be no more than1 percent.
C.Jitter should be less then 40 ms.
D.Managed bandwidth is strongly recommended for voice control traffic.

5.多項選擇題Which three of these are elements of the Cisco Unified Wireless Network architecture?()

A.cell phones
B.remote access
C.mobility services
D.network management
E.network unification
F.network decentralization

7.單項選擇題Which of these Layer 2 access designs does not support VLAN extensions?()

A.FlexLinks
B.loop-free U
C.looped square
D.looped triangle
E.loop-free inverted U

9.多項選擇題What are three primary activities in the cycle of building an enterprise security strategy?()

A. activity audit
B. administration
C. policy establishment
D. technology implementation

10.多項選擇題Which two of these are recommended practices with trunks? ()

A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.