考题
A route-based VPN is required for which scenario? ()
A. when the remote VPN peer is behind a NAT deviceB. when multiple networks need to be reached across the tunnelC. when the remote VPN peer is a dialup or remote access clientD. when a dynamic routing protocol such as OSPF is required across the VPN
考题
The Cisco Enterprise Campus Architecture increases the effectiveness of networked applications and services on campus, enabling enterprises to grow their business and stay ahead.What is the outcome of designing all its components with taking interoperability into consideration?()A. improved connectivity optionsB. strengthened securityC. high availabilityD. continuity of service
考题
What is the result when all Cisco Enterprise Campus Architecture components are designed withinteroperability in mind? ()
A. high availabilityB. strengthened securityC. improved connectivity optionsD. continuity of service
考题
When designing the routing for an Enterprise Campus network it is important to keep while of thefollowing filtering aspects in mind?()A、 Filtering is only useful when combined with route summarizationB、 It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networksC、 IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updatesD、 The primary limitation of router filtering is that it can only be applied on outbound updates
考题
When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
考题
When designing the Network Admission Control (NAC) Appliance for the Enterprise Campus Network, which of the following requirements would help the designer to narrow down the NAC choices, from Virtual Gateway to Real IP Gateway, or from In-band to Out-band?()A、 QoS ToS/DSCP values are required to be forwarded transparentlyB、 Device redundancy is requiredC、 Per-user ACL support is requiredD、 Multicast service support is required
考题
A route-based VPN is required for which scenario? ()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnelC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol such as OSPF is required across the VPN
考题
A policy-based IPsec VPN is ideal for which scenario?()A、when you want to conserve tunnel resourcesB、when the remote peer is a dialup or remote access clientC、when you want to configure a tunnel policy with an action of denyD、when a dynamic routing protocol such as OSPF must be sent across the VPN
考题
When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()A、RFPB、RFCC、SLC/SLAD、SOW
考题
What is the result when all Cisco Enterprise Campus Architecture components are designed withinteroperability in mind? ()A、high availabilityB、strengthened securityC、improved connectivity optionsD、continuity of service
考题
The Cisco Enterprise Campus Architecture increases the effectiveness of networked applications and services on campus, enabling enterprises to grow their business and stay ahead. What is the outcome of designing all its components with taking interoperability into consideration?()A、improved connectivity optionsB、strengthened securityC、high availabilityD、continuity of service
考题
A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used
考题
Your company has 300 portable computers that run Microsoft Office Enterprise 2007. The company participates in the Microsoft Software Assurance program. You are designing a solution that enables remote employees to use Office and to access their Home folders. You plan to implement a Remote Desktop Services (RDS) infrastructure, and you plan to deploy Office Enterprise 2007 as a virtual application on the RDS servers. You need to choose the appropriate licenses. Which licensing solution should you choose?()A、1 Office Enterprise 2007 license and 300 App-V for Terminal Services licensesB、300 Office Enterprise 2007 licenses and 300 App-V for Terminal Services licensesC、300 Office Enterprise 2007 licenses and 300 Microsoft Desktop Optimization Pack (MDOP)licensesD、300 Windows Server 2008 R2 RDS client access licenses (CALs)
考题
You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
考题
You are designing a remote access strategy to meet the business technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing Remote Access.
考题
Your company runs Remote Desktop Services. You have a Remote Desktop Web Access (RD Web Access) server. You publish several applications on the internal networ k by using RD Web Access. You need to ensure that the published applications are accessible from the Internet via an HTTPS connection over port 443. What should you do first?()A、Use Internet Information Services (IIS) Manager to disable Forms Authentication .B、Use Internet Information Services (IIS) Manager to enable Windows Authentication.C、Install and configure the Remote Desktop Gateway (RD Gateway) role service on the RD Web Access server.D、Install and configure the Remote Desktop Connection Broker (RD Connection Broker) role service on the RD Web Access server.
考题
You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A、Configure Internet Authentication Service (IAS) for accounting.B、Configure the server running Routing and Remote Access to support L2TP.C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.
考题
You are designing the security for dial-up remote access to meet the business and technical requirements. Which two mechanisms should you use? ()A、 EAP-TLS authenticationB、 MS-CHAP v2 authenticationC、 a stand-alone certification serverD、 an enterprise certification serverE、 MPPE 56-bit encryption
考题
单选题You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A
Configure Internet Authentication Service (IAS) for accounting.B
Configure the server running Routing and Remote Access to support L2TP.C
Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D
Create a separate account for remote access users. Configure these accounts to access the NewApp server only.
考题
单选题You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()A
Configure each server running Routing and Remote Access as a RADIUS Client.B
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
考题
单选题Your company has 300 portable computers that run Microsoft Office Enterprise 2007. The company participates in the Microsoft Software Assurance program. You are designing a solution that enables remote employees to use Office and to access their Home folders. You plan to implement a Remote Desktop Services (RDS) infrastructure, and you plan to deploy Office Enterprise 2007 as a virtual application on the RDS servers. You need to choose the appropriate licenses. Which licensing solution should you choose?()A
1 Office Enterprise 2007 license and 300 App-V for Terminal Services licensesB
300 Office Enterprise 2007 licenses and 300 App-V for Terminal Services licensesC
300 Office Enterprise 2007 licenses and 300 Microsoft Desktop Optimization Pack (MDOP)licensesD
300 Windows Server 2008 R2 RDS client access licenses (CALs)
考题
单选题When designing the Network Admission Control (NAC) Appliance for the Enterprise Campus Network, which of the following requirements would help the designer to narrow down the NAC choices, from Virtual Gateway to Real IP Gateway, or from In-band to Out-band?()A
QoS ToS/DSCP values are required to be forwarded transparentlyB
Device redundancy is requiredC
Per-user ACL support is requiredD
Multicast service support is required
考题
单选题You are designing a remote access strategy to meet the business technical requirements. Which authentication mechanism should you use?()A
MS-CHAP v2.B
Internet Authentication service (IAS).C
Multilink Bandwidth Allocation Protocol (BAP).D
Remote access policies on all servers running Routing Remote Access.
考题
单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A
It is recommended to place the VPN termination device in line with the Enterprise Edge 1B
Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC
VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD
Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
考题
多选题You are designing the security for dial-up remote access to meet the business and technical requirements. Which two mechanisms should you use? ()AEAP-TLS authenticationBMS-CHAP v2 authenticationCa stand-alone certification serverDan enterprise certification serverEMPPE 56-bit encryption
考题
单选题You are designing a remote access strategy to meet the business technical requirements. Which authentication mechanism should you use?()A
MS-CHAP v2.B
Internet Authentication service (IAS).C
Multilink Bandwidth Allocation Protocol (BAP).D
Remote access policies on all servers running Routing Remote Access.
考题
单选题When designing the routing for an Enterprise Campus network it is important to keep while of thefollowing filtering aspects in mind?()A
Filtering is only useful when combined with route summarizationB
It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networksC
IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updatesD
The primary limitation of router filtering is that it can only be applied on outbound updates
考题
多选题When designing the IP routing for the Enterprise Campus network, which of these following twoiBGB considerations should be taken into account?()AiBGB dual horning with different iSPs puts the Enterprise at the risk of becoming a transitnetworkBiBGP requires a full mesh of eBGP peersCRouters will not advertise iBGP learned routers to other iBGP peers.DThe use of route reflections or Confederation eliminate any full mesh requirement while helpingto scale iBGPEiGBP peers do not add any information to the AS path