网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()
A

 It is recommended to place the VPN termination device in line with the Enterprise Edge 1

B

 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment

C

 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place

D

 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7


参考答案

参考解析
解析: 暂无解析
更多 “单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A  It is recommended to place the VPN termination device in line with the Enterprise Edge 1B  Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC  VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD  Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7” 相关考题
考题 A route-based VPN is required for which scenario? () A. when the remote VPN peer is behind a NAT deviceB. when multiple networks need to be reached across the tunnelC. when the remote VPN peer is a dialup or remote access clientD. when a dynamic routing protocol such as OSPF is required across the VPN

考题 The Cisco Enterprise Campus Architecture increases the effectiveness of networked applications and services on campus, enabling enterprises to grow their business and stay ahead.What is the outcome of designing all its components with taking interoperability into consideration?()A. improved connectivity optionsB. strengthened securityC. high availabilityD. continuity of service

考题 What is the result when all Cisco Enterprise Campus Architecture components are designed withinteroperability in mind? () A. high availabilityB. strengthened securityC. improved connectivity optionsD. continuity of service

考题 When designing the routing for an Enterprise Campus network it is important to keep while of thefollowing filtering aspects in mind?()A、 Filtering is only useful when combined with route summarizationB、 It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networksC、 IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updatesD、 The primary limitation of router filtering is that it can only be applied on outbound updates

考题 When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

考题 When designing the Network Admission Control (NAC) Appliance for the Enterprise Campus Network, which of the following requirements would help the designer to narrow down the NAC choices, from Virtual Gateway to Real IP Gateway, or from In-band to Out-band?()A、 QoS ToS/DSCP values are required to be forwarded transparentlyB、 Device redundancy is requiredC、 Per-user ACL support is requiredD、 Multicast service support is required

考题 A route-based VPN is required for which scenario? ()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnelC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol such as OSPF is required across the VPN

考题 A policy-based IPsec VPN is ideal for which scenario?()A、when you want to conserve tunnel resourcesB、when the remote peer is a dialup or remote access clientC、when you want to configure a tunnel policy with an action of denyD、when a dynamic routing protocol such as OSPF must be sent across the VPN

考题 When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()A、RFPB、RFCC、SLC/SLAD、SOW

考题 What is the result when all Cisco Enterprise Campus Architecture components are designed withinteroperability in mind? ()A、high availabilityB、strengthened securityC、improved connectivity optionsD、continuity of service

考题 The Cisco Enterprise Campus Architecture increases the effectiveness of networked applications and services on campus, enabling enterprises to grow their business and stay ahead. What is the outcome of designing all its components with taking interoperability into consideration?()A、improved connectivity optionsB、strengthened securityC、high availabilityD、continuity of service

考题 A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used

考题 Your company has 300 portable computers that run Microsoft Office Enterprise 2007. The company participates in the Microsoft Software Assurance program.  You are designing a solution that enables remote employees to use Office and to access their Home folders. You plan to implement a Remote Desktop Services (RDS) infrastructure, and you plan to deploy Office Enterprise 2007 as a virtual application on the RDS servers. You need to choose the appropriate licenses.  Which licensing solution should you choose?()A、1 Office Enterprise 2007 license and 300 App-V for Terminal Services licensesB、300 Office Enterprise 2007 licenses and 300 App-V for Terminal Services licensesC、300 Office Enterprise 2007 licenses and 300 Microsoft Desktop Optimization Pack (MDOP)licensesD、300 Windows Server 2008 R2 RDS client access licenses (CALs)

考题 You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

考题 You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink  Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing  Remote Access.

考题 Your company runs Remote Desktop Services. You have a Remote Desktop Web Access (RD Web Access) server. You publish several applications on the internal networ k by using RD Web Access. You need to ensure that the published applications are accessible from the Internet via an HTTPS connection over port 443. What should you do first?()A、Use Internet Information Services (IIS) Manager to disable Forms Authentication .B、Use Internet Information Services (IIS) Manager to enable Windows Authentication.C、Install and configure the Remote Desktop Gateway (RD Gateway) role service on the RD Web Access server.D、Install and configure the Remote Desktop Connection Broker (RD Connection Broker) role service on the RD Web Access server.

考题 You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A、Configure Internet Authentication Service (IAS) for accounting.B、Configure the server running Routing and Remote Access to support L2TP.C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

考题 You are designing the security for dial-up remote access to meet the business and technical requirements.   Which two mechanisms should you use? ()A、 EAP-TLS authenticationB、 MS-CHAP v2 authenticationC、 a stand-alone certification serverD、 an enterprise certification serverE、 MPPE 56-bit encryption

考题 单选题You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()A  Configure Internet Authentication Service (IAS) for accounting.B  Configure the server running Routing and Remote Access to support L2TP.C  Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D  Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

考题 单选题You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A  Configure each server running Routing and Remote Access as a RADIUS Client.B  Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C  Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D  Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

考题 单选题Your company has 300 portable computers that run Microsoft Office Enterprise 2007. The company participates in the Microsoft Software Assurance program.  You are designing a solution that enables remote employees to use Office and to access their Home folders. You plan to implement a Remote Desktop Services (RDS) infrastructure, and you plan to deploy Office Enterprise 2007 as a virtual application on the RDS servers. You need to choose the appropriate licenses.  Which licensing solution should you choose?()A 1 Office Enterprise 2007 license and 300 App-V for Terminal Services licensesB 300 Office Enterprise 2007 licenses and 300 App-V for Terminal Services licensesC 300 Office Enterprise 2007 licenses and 300 Microsoft Desktop Optimization Pack (MDOP)licensesD 300 Windows Server 2008 R2 RDS client access licenses (CALs)

考题 单选题When designing the Network Admission Control (NAC) Appliance for the Enterprise Campus Network, which of the following requirements would help the designer to narrow down the NAC choices, from Virtual Gateway to Real IP Gateway, or from In-band to Out-band?()A  QoS ToS/DSCP values are required to be forwarded transparentlyB  Device redundancy is requiredC  Per-user ACL support is requiredD  Multicast service support is required

考题 单选题You are designing a remote access strategy to meet the business  technical requirements.  Which authentication mechanism should you use?()A  MS-CHAP v2.B  Internet Authentication service (IAS).C  Multilink  Bandwidth Allocation Protocol (BAP).D  Remote access policies on all servers running Routing  Remote Access.

考题 单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A  It is recommended to place the VPN termination device in line with the Enterprise Edge 1B  Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC  VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD  Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

考题 多选题You are designing the security for dial-up remote access to meet the business and technical requirements.   Which two mechanisms should you use? ()AEAP-TLS authenticationBMS-CHAP v2 authenticationCa stand-alone certification serverDan enterprise certification serverEMPPE 56-bit encryption

考题 单选题You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()A MS-CHAP v2.B Internet Authentication service (IAS).C Multilink  Bandwidth Allocation Protocol (BAP).D Remote access policies on all servers running Routing  Remote Access.

考题 单选题When designing the routing for an Enterprise Campus network it is important to keep while of thefollowing filtering aspects in mind?()A  Filtering is only useful when combined with route summarizationB  It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networksC  IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updatesD  The primary limitation of router filtering is that it can only be applied on outbound updates

考题 多选题When designing the IP routing for the Enterprise Campus network, which of these following twoiBGB considerations should be taken into account?()AiBGB dual horning with different iSPs puts the Enterprise at the risk of becoming a transitnetworkBiBGP requires a full mesh of eBGP peersCRouters will not advertise iBGP learned routers to other iBGP peers.DThe use of route reflections or Confederation eliminate any full mesh requirement while helpingto scale iBGPEiGBP peers do not add any information to the AS path