网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
What is the recommended practice when considering VPN termination and firewall placement?()

A. have the firewall and VPN appliance deployed in parallel

B. place the VPN in line with the firewall, with the VPN terminating inside the firewall

C. place the public side of the VPN termination device in the DMZ behind a firewall

D. place the VPN in line with the firewall, with the VPN terminating outside the firewall


参考答案

更多 “ What is the recommended practice when considering VPN termination and firewall placement?() A. have the firewall and VPN appliance deployed in parallelB. place the VPN in line with the firewall, with the VPN terminating inside the firewallC. place the public side of the VPN termination device in the DMZ behind a firewallD. place the VPN in line with the firewall, with the VPN terminating outside the firewall ” 相关考题
考题 As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A. inline with a firewallB. in a DMZ outside the firewallC. parallel with a firewallD. in a DMZ behind the firewall

考题 Refer to the exhibit. When deploying an MSFC and an FWSM, which statement is correct?() A. Proper placement depends on the VLAN assignment.B. Place it outside the firewall.C. Place it inside the firewall to make design and management easier.D. Place it inside the firewall with multiple context modes connecting to all configured contexts.

考题 What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A、 RADIUS or LDAPB、 an internal router running EIGRPC、 Reverse Route Injection and OSPF or RIPv2D、 the VPN appliance to be deployed in line with the firewall

考题 When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

考题 The VPN termination function provides the ability to connect two networks together securely over the internet. Which of these is true of IP addressing with regard to VPN termination?()A、termination devices need routable addresses inside the VPNB、termination devices need not routable addresses inside the VPNC、IGP routing protocols will update their routing tables over anIPsec VPND、addressing designs need to allow for summarization

考题 When using IPAT via Aliasing, what is the default distribution preference for the placement of the service IPlabels?()A、CollocationB、Anti-CollocationC、Collocation with persistentD、Anti-Collocation with persistent

考题 Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall

考题 What is the recommended practice regarding UDLD when implementing it in all fiber-optic LANports?()A、 Adjust the default hello timers to three seconds for aggressive modeB、 Enable it in global mode and on every interface you need to supportC、 Enable it in global mode to support every individual fiber-optic interfaceD、 Enable it to create channels containing up to eight parallel links between switches

考题 What is the recommended practice when considering VPN termination and firewall placement?()A、 have the firewall and VPN appliance deployed in parallelB、 place the VPN in line with the firewall, with the VPN terminating inside the firewallC、 place the public side of the VPN termination device in the DMZ behind a firewallD、 place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 As a network technician, do you know what is a recommended practice for secure configurationmanagement?()A、Disable post scanB、Use SSH or SSLC、Enable trust levelsD、Deny echo replies on all edge routers

考题 As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A、 inline with a firewallB、 in a DMZ outside the firewallC、 parallel with a firewallD、 in a DMZ behind the firewall

考题 You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

考题 Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.

考题 单选题As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A inline with a firewallB in a DMZ outside the firewallC parallel with a firewallD in a DMZ behind the firewall

考题 单选题As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A  inline with a firewallB  in a DMZ outside the firewallC  parallel with a firewallD  in a DMZ behind the firewall

考题 单选题What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A  RADIUS or LDAPB  an internal router running EIGRPC  Reverse Route Injection and OSPF or RIPv2D  the VPN appliance to be deployed in line with the firewall

考题 问答题Practice 4  A: What is important when...?  Choosing a conference center  ●Facilities  ●Accommodations  ●Location  B: What is important when...?  Selecting an employee  ●Qualification  ●Personality  ● Creativity

考题 问答题Practice 7  A: What is important when...?  Maintaining customer interest in a company’s products  ●Quality goods  ● Excellent after-sales service  ●Feedback  B: What is important when...?  Considering transport management  ●Timing  ●Cost

考题 单选题You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall.  What should you do ( )?A Create an IPsec tunnelB Create an SSTP VPN connectionC Create a PPTP VPN connectionD Create an L2TP VPN connection

考题 单选题You deploy a Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack.  The firewall is configured to allow only secured Web communications. You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall.What should you do?()A Create an IPsec tunnel.B Create an SSTP VPN connection.C Create a PPTP VPN connection.D Create an L2TP VPN connection.

考题 单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A  It is recommended to place the VPN termination device in line with the Enterprise Edge 1B  Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC  VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD  Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

考题 单选题What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A RADIUS or LDAPB an internal router running EIGRPC Reverse Route Injection and OSPF or RIPv2D the VPN appliance to be deployed in line with the firewall

考题 单选题What is the recommended practice when considering VPN termination and firewall placement?()A  have the firewall and VPN appliance deployed in parallelB  place the VPN in line with the firewall, with the VPN terminating inside the firewallC  place the public side of the VPN termination device in the DMZ behind a firewallD  place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 单选题You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A  Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B  Allow all inbound VPN traffic to pass through the perimeter firewall only.C  Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D  Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.