网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()
A
DMVPN
B
MPLS VPN
C
Virtual Tunnel Interface (VTI)
D
SSL VPN
E
PPPoE
参考答案
参考解析
解析:
暂无解析
更多 “多选题Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()ADMVPNBMPLS VPNCVirtual Tunnel Interface (VTI)DSSL VPNEPPPoE” 相关考题
考题
Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
A. dial-up VPNB. IKE authenticationC. XAuth authenticationD. shared IKE authentication
考题
Which two statements are correct concerning DHCP Internal Server in the E-series router?()
A.Provide dynamic IPaddressesforDSIs.B.Provide connectivity to DHCP servers on other subnetworks.C.Provide dynamic IP addresses for SRC applications.D.Provide dynamic IP addresses from pools used for PPPoE subscribers.
考题
Which two forms of DSL connectivity provide the same bandwidth in both directions?()
A.ADSLB.HDSLC.SDSLD.RADSL
考题
Router R1 sits at an Enterprise branch office, using both the Internet and a leased line to another Enterprise router for its two connectivity options back into the rest of the Enterprise network. The engineer planning for this branch decided to use the leased line for all Enterprise traffic, unless it fails, in which case the Internet connection should be used to pass traffic to the Enterprise.Which of the following is most likely to be useful on the branch router?()A. IPsec tunnelB. GRE tunnelC. Floating stati c routeD. An IGP
考题
Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()
A. DMVPNB. MPLS VPNC. Virtual Tunnel Interface (VTI)D. SSL VPNE. PPPoE
考题
IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic]
B.private]
C.personal
D.proper
考题
Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()A、DMVPNB、MPLS VPNC、Virtual Tunnel Interface (VTI)D、SSL VPNE、PPPoE
考题
Which two WAN access methods are specified for a simplified and cost-effective Cisco Single-Site Secure Network Foundation Deployment Design?()A、Frame-RelayB、Leased LineC、MPLSD、DSLE、CableF、Wireless
考题
Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A、802.1XB、Cisco Temporal Key Integrity Protocol (CKIP)C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)D、Cisco Message Integrity Check (CMIC)E、One-Time Passwords (OTP)F、Advanced Encryption Standard (AES)
考题
Which two statements about FCIP and iSCSI are correct?()A、 The FCIP stack supports file-level storage for remote devices.B、 Both require high throughput with low latency and low jitter.C、 The purpose of FCIP is to provide connectivity between host and storage.D、 The iSCSI stack supports block-level storage for remote devices.E、 The purpose of iSCSI is to provide connectivity between separate wide-area SANs.
考题
Router R1 sits at an Enterprise branch office, using both the Internet and a leased line to another Enterprise router for its two connectivity options back into the rest of the Enterprise network. The engineer planning for this branch decided to use the leased line for all Enterprise traffic, unless it fails, in which case the Internet connection should be used to pass traffic to the Enterprise. Which of the following is most likely to be useful on the branch router?()A、IPsec tunnelB、GRE tunnelC、Floating stati c routeD、An IGP
考题
Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel
考题
Which two demonstrate encapsulation of data? ()A、 Member data have no access modifiers.B、 Member data can be modified directly.C、 The access modifier for methods is protected.D、 The access modifier to member data is private.E、 Methods provide for access and modification of data.
考题
Which three options are valid WAN connectivity methods? ()A、PPPB、WAPC、HDLCD、MPLSE、L2TPv3F、ATM
考题
Which two functions does Cisco Configuration Assistant provide?()A、 device DiscoveryB、 call forwardingC、 call routing configurationD、 command line configurationE、 wireless connectivity
考题
Which of the following methods of user authentication is the MOST secure?()A、CHAPB、KerberosC、TACACSD、EAP
考题
Which two options are reasons for using traffic classification?()A、to use the classification to route trafficB、to use the classification to reorder packets from various sourcesC、to use the classification to discard malformed packetsD、to use the classification to provide the configured service level
考题
Which two statements are correct concerning DHCP Internal Server in the E-series router?()A、Provide dynamic IPaddressesforDSIs.B、Provide connectivity to DHCP servers on other subnetworks.C、Provide dynamic IP addresses for SRC applications.D、Provide dynamic IP addresses from pools used for PPPoE subscribers.
考题
Which two configuration elements are required for a route-based VPN?()A、secure tunnel interfaceB、security policy to permit the IKE trafficC、a route for the tunneled transit trafficD、tunnel policy for transit traffic referencing the IPsec VPN
考题
多选题Which two secure remote access methods are available on the WX platforms?() (Choose two.)ASSLBSSHCTelnetDHTTP
考题
多选题Which two options are reasons for using traffic classification?()Ato use the classification to route trafficBto use the classification to reorder packets from various sourcesCto use the classification to discard malformed packetsDto use the classification to provide the configured service level
考题
多选题Which two WAN access methods are specified for a simplified and cost-effective Cisco Single-Site Secure Network Foundation Deployment Design?()AFrame-RelayBLeased LineCMPLSDDSLECableFWireless
考题
多选题Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()Adial-up VPNBIKE authenticationCXAuth authenticationDshared IKE authentication
考题
多选题Which two forms of DSL connectivity provide the same bandwidth in both directions?()AADSLBHDSLCSDSLDRADSL
考题
多选题Which two functions does Cisco Configuration Assistant provide?()Adevice DiscoveryBcall forwardingCcall routing configurationDcommand line configurationEwireless connectivity
热门标签
最新试卷