多項(xiàng)選擇題What are disadvantages of Network Address Translation Transparency?()

A.There is no disadvantage.
B.It will add 16 bytes per packet of overhead(8 bytes UDP header, and 8 bytes of NON-IKE Marker).
C.It will add 36 bytes per packet of overhead (20 bytes of IP header, 8 bytes of UDP header, 8 bytes of NON-IKE Marker).
D.It will require that both crypto peers support this feature in the IOS version. Both crypto peers must also have this feature enabled.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Which is not a reason that Internet Service Providers prefer to use PPP over Ethernet (PPoE)?()

A.access control and billing can be done on a per-user, rather than a per-site basis
B.supports Link Fragmentation and Interleaving 
C.provides the ability to connect a network of hosts over a simple bridging access device
D.provides a consistent means of authenticating users (RADIUS for example)

2.多項(xiàng)選擇題When is it appropriate to enable Link Fragmentation and Interleaving (LFI) on DSL connections for Teleworkers?()

A.uplink speed less than 768kbps
B.supporting Voice-over-IP
C.using PPPoE encapsulation
D.using PPPoA encapsulation
E.uplink speed greater than 768kbps

3.單項(xiàng)選擇題A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()

A.Remark the traffic on ingress and prioritize on egress.
B.Enable CEF and Netflow. 
C.Configure the MS-Windows QoS Scheduler to prioritize this traffic.
D.Enable WRED.

4.單項(xiàng)選擇題

Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()

A.Twenty bytes of header will be replaced with five bytes. 
B.If the IPSec transform set includes Authentication Header, the receiving IPSec peer will discard the packets. 
C.The IPSec packets will be dropped by Router A's compression logic.
D.The voice packets will not be compressed.

5.多項(xiàng)選擇題What are the DSL-specific factors that require additional bandwidth when supporting Voice-over-IP over an IPSec VPN?()

A.A voice packet is sent via multiple fixed-length cells; a portion of the last cell is padding, requiring more bandwidth.
B.ADSL typically uses PPPoE encapsulation, which adds additional overhead to each voice packet.
C.A voice packet is sent via multiple fixed-length cells; each cell has about 10% Layer-2 header overhead. 
D.IPSec requires additional overhead for the header and hash. 
E.ADSL carrier band requires additional bits to be carried over the wire to the DSL Access Concentrator.

8.單項(xiàng)選擇題

Refer to the exhibit. Available public Internet sites are sometimes used for estimating performance. Which statement regarding their use for estimating VPN performance is correct?()

A.Throughput results are valid as a value from the Teleworker's home to the corporate site, regardless of the location of the public test server. 
B.Throughput results may not be valid due to the public server's location on the Internet and fluctuations based on the use of the public server. 
C.Throughput values are not affected by the choice of split tunneling or Internet access through the VPN. 
D.Throughput results are unrelated to the Teleworker PC configuration or current PC use.

9.單項(xiàng)選擇題What is the minimum recommended uplink/downlink speed to support a single encrypted IP voice Teleworker call?()

A.256kbps / 1024kbps
B.256kbps / 1544kbps
C.160kbps / 768kbps
D.384kbps / 384kbps
E.128kbps / 512kbps

10.單項(xiàng)選擇題For best packet switching performance with crypto, what is the recommend packet switching path in a Cisco Teleworker Router?()

A.Process Switching
B.Silicon Switching 
C.Cisco Express Forwarding (CEF) Switching
D.Autonomous Switching

最新試題

When is an IPSec SA built on the Teleworker Router?()

題型:?jiǎn)雾?xiàng)選擇題

Choose the false statement concerning the use of CiscoWorks Internetwork Performance Monitor (IPM) in a Teleworker deployment.()

題型:?jiǎn)雾?xiàng)選擇題

A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()

題型:?jiǎn)雾?xiàng)選擇題

An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Given this DSL router's sub-interface configuration, select the two true statements. Assume the interface is UP/UP.()

題型:多項(xiàng)選擇題

When is it appropriate to enable Link Fragmentation and Interleaving (LFI) on DSL connections for Teleworkers?()

題型:多項(xiàng)選擇題

Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()

題型:?jiǎn)雾?xiàng)選擇題

What are the DSL-specific factors that require additional bandwidth when supporting Voice-over-IP over an IPSec VPN?()

題型:多項(xiàng)選擇題

Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()

題型:?jiǎn)雾?xiàng)選擇題

It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()

題型:?jiǎn)雾?xiàng)選擇題