單項(xiàng)選擇題To securely transport EIGRP traffic, a network administrator will build VPNs between sites. Whatis the best method to accomplish the transport of EIGRP traffic?()

A. IPSec in tunnel mode
B. IPSec in transport mode
C. GRE with IPSec in transport mode
D. GRE with IPSec in tunnel mode


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()

A. single layer of firewalling
B. multiple layers of firewalling
C. firewall connections in either an active or standby state
D. an architecture in which all traffic between firewalls goes through application-specific servers

3.單項(xiàng)選擇題You are the Cisco Network Designer in Cisco.com. Which statement is correct regarding NBARand NetFlow?()

A. NBAR examines data in Layers 1 and 4.
B. NBAR examines data in Layers 3 and 4.
C. NetFlow examines data in Layers 3 and 4.
D. NBAR examines data in Layers 2 through 4.

5.單項(xiàng)選擇題You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientlessend-user devices?()

A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.

6.多項(xiàng)選擇題What are two design guidelines for VoIP networks?()

A. Delay should be no more than 10 ms.
B. Loss should be no more than 1 percent.
C. Jitter should be less then 40 ms.
D. Managed bandwidth is strongly recommended for voice control traffic.

8.多項(xiàng)選擇題What are three primary activities in the cycle of building an enterprise security strategy?()

A. activity audit
B. administration
C. policy establishment
D. technology implementation

9.多項(xiàng)選擇題Which two of these are recommended practices with trunks? ()

A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network 
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

10.單項(xiàng)選擇題When is the site-to-site remote access model appropriate? ()

A. for multiple ISDN connections
B. for modem concentrated dial-up connections
C. for a group of users in the same vicinity sharing a connection
D. for use by mobile users

最新試題

What is the recommended radius of a cell for a voice-ready wireless network?()

題型:?jiǎn)雾?xiàng)選擇題

Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()

題型:多項(xiàng)選擇題

What amount of cell overlap ensures smooth roaming for wireless endpoints?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements about zoning are correct?()

題型:多項(xiàng)選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:?jiǎn)雾?xiàng)選擇題

The Cisco NAC Appliance is able to check which three items before allowing network access?()

題型:多項(xiàng)選擇題

What are two characteristics of GSS? ()

題型:多項(xiàng)選擇題

Which two statements about an interface configured with the asr-group command are correct? ()

題型:多項(xiàng)選擇題

Which two of these correctly describe Fibre Channel?()

題型:多項(xiàng)選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:?jiǎn)雾?xiàng)選擇題