A.IPSec
B.IPSec with GRE
C.DMVPN
D.EZVPN
E.all of the choices
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()
A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router
D.Cisco VPN3002 Hardware Client
E.Cisco ubr925 cable modem
F.Cisco SW VPN Client
Refer to the exhibit. Given the topology shown, what are two ways to allow the VPN to operate?()
A.Use route maps on the 831
B.The 831 has IPSec NAT-Transparency (NAT-T) enabled
C.Disallow split tunneling on the 831
D.IPSec pass-through must be enabled on the Linksys
E.Use the port-mapping feature on the residential router
A.CiscoWorks VPN Manager
B.deploy Linksys routers with menu-driven configuration
C.Easy VPN client mode
D.disable 802.1x and Auth Proxy on the Teleworker router
A.RSVP is a required configuration to support conference calls without voice packet loss.
B.The QoS configuration on the 831 router must always provision sufficient bandwidth for two RTP streams.
C.Call admission control is an issue only when using hardware DSP resources.
D.When using the conference call features on a 7960 IP phone, only one RTP stream is present regardless of how many extensions are on the conference.
Refer to the exhibit. Given this deployment model, what capability must the Broadband Router provide for the Enterprise applications to function properly?()
A.IPSec tunnel termination
B.DHCP
C.hardware-accelerated IPSec encryption
D.Traffic Shaping
E.Split-tunneling
最新試題
Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
Which statement regarding 802.1X is true?()
Refer to the exhibit. Select the true statement.()
Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()
What is not a difference between VPN tunnel authentication and per-user authentication?()
A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()
It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()
What are the DSL-specific factors that require additional bandwidth when supporting Voice-over-IP over an IPSec VPN?()