网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
What is a key benefit of using a GRE tunnel to provide connectivity bet ween branch offices and headquarters?()
- A、authentication, integrity checking, and confidentiality
- B、less overhead
- C、dynamic routing over the tunnel
- D、granular QoS support
- E、open standard
- F、scalability
参考答案
更多 “What is a key benefit of using a GRE tunnel to provide connectivity bet ween branch offices and headquarters?()A、authentication, integrity checking, and confidentialityB、less overheadC、dynamic routing over the tunnelD、granular QoS supportE、open standardF、scalability” 相关考题
考题
All three types of cryptography schemes have unique function mapping to specific applications. For example, the symmetric key( ) approach is typically used for the encryption of data providing ( ) , whereas asymmetric key cryptography is mainly used in key ( ) and nonrepudiation , thereby providing confidentiality and authentication. The hash ( ) (noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message ( ) and identity of peers during transport over insecure channels.A.CryptographyB.decodeC.privacyD.security@@@SXB@@@A.ConductionB.confidenceC.confidentialityD.connection@@@SXB@@@A.AuthenticationB.structureC.encryptionD.exchange@@@SXB@@@A.AlgorithmB.SecureC.structureD.encryption@@@SXB@@@A.ConfidentialityB.integrityC.serviceD.robustness
考题
Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network.Which of the following answers best describes the router‘s logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()A. When the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceB. When routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceC. When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceD. When permitted by an ACL that was referenced in the associated crypto map
考题
Refer to the exhibit. Which interoperability technique implemented on the dual - stack routers would allow connectivity between IPv6 sites across automatic created tunnels using the 2002::/16 prefix? ()A. Dual StackB. NAT - PTC. 6to4 tunnelD. GRE tunnelE. ISATAP tunnel
考题
What is a key benefit of using a GRE tunnel to provide connectivity bet ween branch offices and headquarters?()
A. authentication, integrity checking, and confidentialityB. less overheadC. dynamic routing over the tunnelD. granular QoS supportE. open standardF. scalability
考题
Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()
A. DMVPNB. MPLS VPNC. Virtual Tunnel Interface (VTI)D. SSL VPNE. PPPoE
考题
All three types of cryptography schemes have unique function mapping to specific.For example,the symmetric key approach( )is typically used for the encryption of data providing( ),whereas asymmetric key cryptography is maidy used in key( )and nonrepudiation,thereby providing confidentiality and authentication.The hash( )(noncryptic),on the other hand,does not provide confidentiality but provides message integrity,and cryptographic hash algorithms provide message(本题)and identity of peers during transport over insecure channels.A.Confidentiality
B.integrity
C.service
D.robustness
考题
Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()A、DMVPNB、MPLS VPNC、Virtual Tunnel Interface (VTI)D、SSL VPNE、PPPoE
考题
In which tunnel-less VPN topology do group members register with a key server in order to receivethe security association necessary to communicate with the group?()A、 Easy VPNB、 GRE tunnelingC、 Virtual Tunnel InterfacesD、 Dynamic Multipoint VPNE、 Group Encrypted Transport VPN
考题
Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network. Which of the following answers best describes the router's logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()A、When the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceB、When routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceC、When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceD、When permitted by an ACL that was referenced in the associated crypto map
考题
Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, and into the core of an Enterprise network. The branch also allows local hosts to communicate directly with public sites in th e Internet over this same DSL connection. Which of the following answers defines how the branch NAT config avoids performing NAT for the Enterprise directed traffic but does perform NAT for the Internet - directed traffic?()A、By not enabling NAT on the I Psec tunnel interfaceB、By not enabling NAT on the GRE tunnel interfaceC、By configuring the NAT - referenced ACL to not permit the Enterprise trafficD、By asking the ISP to perform NAT in the cloud
考题
When implementing WLAN security, what are three benefits of using the Temporal Key Integrity Protocol (TKIP) instead of WEP? ()A、 TKIP uses an advanced encryption scheme based on AESB、 TKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC)C、 TKIP provides per-packet keyingand a rekeying mechanismD、 TKIP provides message integrity checkE、 TKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipsetF、 TKIP uses a 48 bit InitializationVector
考题
Which two statements about the open and shared key wireless-authentication methods are true? ()A、 Shared key authentication is considered more secure than open authentication.B、 Shared key authentication is considered less secure than open authentication.C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
考题
Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site VPNs?()A、allows dynamic routing over the tunnelB、supports multi-protocol (non-IP) traffic over the tunnelC、reduces IPsec headers overhead since tunnel mode is usedD、simplifies the ACL used in the crypto mapE、uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration
考题
What is an advantage of dynamic routing?()A、Unlike static routing, dynamic routing provides redundant IP addresses for end-user devicesB、Unlike static routing, dynamic routing requires no initial user configurationC、Dynamic routing can provide increased network availability when compared to static routingD、Dynamic routing provides DNS services along with IP connectivity; static routing does not
考题
Which two statements about the open and shared key wireless-authentication methods are true?()A、shared key authentication is considered more secure than open authenticationB、shared key authentication is considered less secure than open authenticationC、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer dataD、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer dataE、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data
考题
On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) isfailing, but association using EAP-PEAP is functioning. What needs to be enabled on the standalone accesspoint to correct this issue?()A、network EAPB、open authentication plus MACC、open authentication plus EAPD、a shared key
考题
What is an advantage of dynamic routing?()A、Unlike static routing, dynamic routing provides redundant IP addresses for end-user devices.B、Unlike static routing, dynamic routing requires no initial user configuration.C、Dynamic routing can provide increased network availability when compared to static routing.D、Dynamic routing provides DNS services along with IP connectivity; static routing does not.
考题
What is an advantage of dynamic routing?()A、Unlike static routing, dynamic routing provides redundant IP addresses for end-user devicesB、Unlike static routing, dynamic routing requires no initial user configurationC、Dynamic routing can provide increased network availability when compared to static routingD、Dynamic routing provides DNS services along with IP connectivity, static does not
考题
our company has a main office and 15 branch offices. The company has a single active directory domain. All servers run windows server 2008.You need to ensure that the VPN connections between the office and the branch offices meet the following requirements:All data must be encrypted by using end-to-end encryption.The vpn connection must use computer-level authentication.User names and passwords cannot be used for authentication.What should do?()A、Configure an ipsec connection to use tunnel mode and preshared key authentication.B、Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.C、Configure a L2TP/IPsec connection to use the EAP-TLS authentication.D、Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.
考题
Your company has a main office and 15 branch offices. The company has a single Active Directory domain. All servers run Windows Server 2008. You need to ensure that the VPN connections between the main office and the branch offices meet the following requirements:All data must be encrypted by using end-to-end encryption. The VPN connection must use computer-level authentication User names and passwords cannot be used for authentication. What should you do?()A、 Configure an IPsec connection to use tunnel mode and preshared key authentication.B、 Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.C、 Configure a L2TP/IPsec connection to use the EAP-TLS authenticationD、 Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.
考题
单选题What is an advantage of dynamic routing?()A
Unlike static routing, dynamic routing provides redundant IP addresses for end-user devices.B
Unlike static routing, dynamic routing requires no initial user configuration.C
Dynamic routing can provide increased network availability when compared to static routing.D
Dynamic routing provides DNS services along with IP connectivity; static routing does not.
考题
单选题What is an advantage of dynamic routing?()A
Unlike static routing, dynamic routing provides redundant IP addresses for end-user devicesB
Unlike static routing, dynamic routing requires no initial user configurationC
Dynamic routing can provide increased network availability when compared to static routingD
Dynamic routing provides DNS services along with IP connectivity; static routing does not
考题
多选题Which two statements about the open and shared key wireless-authentication methods are true? ()AShared key authentication is considered more secure than open authentication.BShared key authentication is considered less secure than open authentication.CIf the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.DIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.EIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
考题
单选题What is an advantage of dynamic routing?()A
Unlike static routing, dynamic routing provides redundant IP addresses for end-user devicesB
Unlike static routing, dynamic routing requires no initial user configurationC
Dynamic routing can provide increased network availability when compared to static routingD
Dynamic routing provides DNS services along with IP connectivity, static does not
考题
单选题What is a key benefit of using a GRE tunnel to provide connectivity bet ween branch offices and headquarters?()A
authentication, integrity checking, and confidentialityB
less overheadC
dynamic routing over the tunnelD
granular QoS supportE
open standardF
scalability
考题
单选题In which tunnel-less VPN topology do group members register with a key server in order to receivethe security association necessary to communicate with the group?()A
Easy VPNB
GRE tunnelingC
Virtual Tunnel InterfacesD
Dynamic Multipoint VPNE
Group Encrypted Transport VPN
考题
多选题Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()ADMVPNBMPLS VPNCVirtual Tunnel Interface (VTI)DSSL VPNEPPPoE
热门标签
最新试卷