网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
To securely transport EIGRP traffic, a network administrator will build VPNs between sites. Whatis the best method to accomplish the transport of EIGRP traffic?()
- A、 IPSec in tunnel mode
- B、 IPSec in transport mode
- C、 GRE with IPSec in transport mode
- D、 GRE with IPSec in tunnel mode
参考答案
更多 “To securely transport EIGRP traffic, a network administrator will build VPNs between sites. Whatis the best method to accomplish the transport of EIGRP traffic?()A、 IPSec in tunnel modeB、 IPSec in transport modeC、 GRE with IPSec in transport modeD、 GRE with IPSec in tunnel mode” 相关考题
考题
Hyper Transport 技术的基础是由数据路径、控制信号和时钟信号组成的点对点单项链路。每一条数据路径都可以是2~32宽,标准总线宽度是2、4、8、16和32位。命令、地址和数据共用数据路径。链路由数据路径、控制信号和一个或多个时钟信号组成。基于完整的Hyper Transpor技术系统由处理器、总线和I/0组成。
考题
Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()
A. Enable file and print shareB. FTPC. VPND. Map a drive
考题
The VPN termination function provides the ability to connect two networks together securely over the internet. Which of these is true of IP addressing with regard to VPN termination?()
A. termination devices need routable addresses inside the VPNB. termination devices need not routable addresses inside the VPNC. IGP routing protocols will update their routing tables over anIPsec VPND. addressing designs need to allow for summarization
考题
After each container has been stuffed,responsible personnel will ensure that the doors have been securely closed and are watertight and a ______ has been placed on the container.A.realB.dealC.sealD.meal
考题
work(请作答此空),systems that effectively isolate an organization's internal network structure from an ( ) network, such as the INTERNET is becoming increasingly popular. These firewall systems typically act as application-layer( )between networks, usually offering controlled TELNET, FTP, and SMTP access. With the emergence of more sophisticated( )layer protocols designed to facilitate global information discovery , there exists a need to provide a general ( )for these protocols to transparently and securely traverse a firewall.A.safeguards
B.firewalls
C.routers
D.switches
考题
A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.
A.encodedB.encryptedC.storedD.transmitted
考题
Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()A、Enable file and print shareB、FTPC、VPND、Map a drive
考题
How can mobile devices and wireless networks be secured?()A、 by securely deploying new applications with appropriate performance levelsB、 by providing security that is based on a multilayer,system-level approachC、 by looking subjectively at network traffic for abnormal flowsD、 by requiring a host-based hardware application
考题
What is the purpose of the secure boot-config global configuration ?()A、takes a snapshot of the router running configuration and securely archives it in persistent storageB、stores a secured copy of the Cisco IOS image in its persistent storageC、backs up the Cisco IOS image from flash to a TFTP serverD、enables Cisco IOS image resilience
考题
To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?()A、IPSec in tunnel modeB、IPSec in transport modeC、GRE with IPSec in transport modeD、GRE with IPSec in tunnel mode
考题
A major difference between archiving and backing up data is that data backups:()A、contain data removed from the server.B、contain data that still resides on the server.C、are stored with the servers.D、are stored securely.
考题
Which of the following tools can be used to securely connect to a remote system?()A、RCMDB、SSHC、TELNETD、HTTP
考题
单选题To securely transport EIGRP traffic, a network administrator will build VPNs between sites. Whatis the best method to accomplish the transport of EIGRP traffic?()A
IPSec in tunnel modeB
IPSec in transport modeC
GRE with IPSec in transport modeD
GRE with IPSec in tunnel mode
考题
单选题How can mobile devices and wireless networks be secured?()A
by securely deploying new applications with appropriate performance levelsB
by providing security that is based on a multilayer,system-level approachC
by looking subjectively at network traffic for abnormal flowsD
by requiring a host-based hardware application
考题
单选题挽牢首、尾缆,放登艇梯。()A
Make fast the fore and aft ropes and lay out the embarkation ladder.B
Each cargo should be securely lashed.C
We’ll start loading right now.D
Make fast the heaving rope, lay out the embarkation ladder.
考题
单选题The VPN termination function provides the ability to connect two networks together securely over the internet. Which of these is true of IP addressing with regard to VPN termination?()A
termination devices need routable addresses inside the VPNB
termination devices need not routable addresses inside the VPNC
IGP routing protocols will update their routing tables over anIPsec VPND
addressing designs need to allow for summarization
考题
单选题When pushing ahead,wires leading from the quarters of the after outboard barges to the bow of a towboat().A
prevent the towboat from sliding when the rudder is movedB
prevent the barges from spreading out when backing downC
hold the towboat securely to the bargesD
prevent the sidewise movement of the face barges
考题
单选题A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()A
Remotely connect to the user's laptop and review the network configuration settingsB
Ping the web server from inside the network to ensure it is still up and running.C
Check to make sure the company's website is accessible from the Internet.D
Ensure the Ethernet cable is securely plugged into the user's laptop
考题
单选题An administrator needs to update a router configuration for a router that does not support SSH.Which of the following can be used to securely update the router configuration?()A
FTPB
SNMPv2C
TFTPD
KTTPS
考题
单选题You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ( )?A
Create an IPsec tunnelB
Create an SSTP VPN connectionC
Create a PPTP VPN connectionD
Create an L2TP VPN connection
考题
单选题The VPN termination function provides the ability to connect two networks together securely overthe internet. Which of these is true of IP addressing with regard to VPN termination?()A
termination devices need routable addresses inside the VPNB
termination devices need not routable addresses inside the VPNC
IGP routing protocols will update their routing tables over an IPsec VPND
addressing designs need to allow for summarization
考题
名词解释题电子传递系统(electron transpor tsystem)
热门标签
最新试卷