單項(xiàng)選擇題Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()

A.Easy VPN
B.GRE tunneling
C.Virtual Tunnel Interfaces
D.Dynamic Multipoint VPN
E.Group Encrypted Transport VPN


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Why is STP required when VLANs span access layer switches?()

A.to ensure a loop-free topology
B.to protect against user-side loops
C.in order to support business applications
D.because of the risk of lost connectivity without STP
E.for the most deterministic and highly available network topology

2.單項(xiàng)選擇題In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

A.19 dBm
B.7 dBm
C.10 dBm
D.6 dBm
E.5 dbm to 10 dBm

3.單項(xiàng)選擇題What is a virtual firewall?()

A.another name for a firewall deployed in routed mode
B.another name for a firewall deployed in transparent mode
C.a separation of multiple firewall security contexts on a single firewall
D.a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
E.a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)

4.多項(xiàng)選擇題In which two locations in an enterprise network can an IPS sensor be placed?()

A.bridging VLANs on two switches
B.bridging two VLANs on one switch
C.between two Layer 2 devices with trunking
D.between two Layer 2 devices without trunking
E.between a Layer 2 device and a Layer 3 device with trunking

5.單項(xiàng)選擇題In base e-Commerce module designs, where should firewall perimeters be placed?()

A.core layer
B.Internet boundary
C.aggregation layer
D.aggregation and core layers
E.access and aggregation layers

6.多項(xiàng)選擇題Which two of these are characteristics of an IDS sensor?()

A.passively listens to network traffic
B.is an active device in the traffic path
C.has a permissive interface that is used to monitor networks
D.traffic arrives on one IDS interface and exits on another
E.has a promiscuous interface that is used to monitor the network

8.單項(xiàng)選擇題Which of these terms refers to call issues that cause variations in timing or time of arrival?()

A.queuing
B.jitter
C.packet loss
D.digitized sampling
E.signal-to-noise ratio ratio

9.多項(xiàng)選擇題

Refer to the exhibit. Which two of these are correct regarding the recommended practice for distribution layer design?()

A.use a redundant link to the core
B.use a Layer 2 link between distribution switches
C.never use a redundant link to the core because of convergence issues
D.use a Layer 3 link between distribution switches with route summarization
E.use a Layer 3 link between distribution switches without route summarization

10.單項(xiàng)選擇題You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientless end-user devices?()

A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.

最新試題

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

題型:單項(xiàng)選擇題

You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()

題型:單項(xiàng)選擇題

What is the recommended practice when considering VPN termination and firewall placement?()

題型:單項(xiàng)選擇題

The Cisco NAC Appliance is able to check which three items before allowing network access?()

題型:多項(xiàng)選擇題

Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()

題型:多項(xiàng)選擇題

An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()

題型:單項(xiàng)選擇題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:單項(xiàng)選擇題

During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()

題型:單項(xiàng)選擇題

Which technology allows centralized storage services to be shared across different VSANs?()

題型:單項(xiàng)選擇題

As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()

題型:單項(xiàng)選擇題