网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A route-based VPN is required for which scenario? ()
A

when the remote VPN peer is behind a NAT device

B

when multiple networks need to be reached across the tunnel

C

when the remote VPN peer is a dialup or remote access client

D

when a dynamic routing protocol such as OSPF is required across the VPN


参考答案

参考解析
解析: 暂无解析
更多 “单选题A route-based VPN is required for which scenario? ()A when the remote VPN peer is behind a NAT deviceB when multiple networks need to be reached across the tunnelC when the remote VPN peer is a dialup or remote access clientD when a dynamic routing protocol such as OSPF is required across the VPN” 相关考题
考题 A route-based VPN is required for which scenario? () A. when the remote VPN peer is behind a NAT deviceB. when multiple networks need to be reached across the tunnelC. when the remote VPN peer is a dialup or remote access clientD. when a dynamic routing protocol such as OSPF is required across the VPN

考题 Which type of VPN router is not required to run MPLS?() A. Provider Core (P)B. Provider Edge (PE)C. Customer Edge (CE)D. Customer Boundary (CB)

考题 When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? As a Network Engineer, it is necessary for you to know how to implement MPLS VPNs between Customer Edge and Provider Edge routers. Refer to the following descriptions, which one is making sense?()A、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistributionB、If using IS-IS as the PE-CE routing protocol, no redistribution is requiredC、If using static routes between the CE and PE routers, no redistribution of other VPN routes is requiredD、If PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required

考题 For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()A、Broadband serviceB、Headend VPN deviceC、VPN access deviceD、Tunnel

考题 In JUNOS software, which type of VPN supports IPX and Appletalk?()A、Martini based VPN’sB、2547bis based VPN’sC、Sham link based VPN’sD、Virtual Router based VPN’s

考题 Which two steps are required for a Kompella Layer 2 VPN?()A、Configure a siteid for each ce.B、Configure a VPN label for each VPN.C、Configure a MP-bgp session to each pe.D、Configure an Extended LDP Session to each pe.

考题 When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? ()A、If using IS-IS as the PE-CE routing protocol, no redistribution is required.B、If using static routes between the CE and PE routers, no redistribution of other VPN routes is required.C、If the PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required.D、If RIP is the routing protocol that is used between the PE-CE routers, no redistribution is required, but any other protocol will require redistribution.E、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution.

考题 Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A、A route-based VPN generally uses less resources than a policy-based VPN.B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

考题 A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used

考题 Which two configuration elements are required for a route-based VPN?()A、secure tunnel interfaceB、security policy to permit the IKE trafficC、a route for the tunneled transit trafficD、tunnel policy for transit traffic referencing the IPsec VPN

考题 In which scenario will you perform a cancel-based recovery?()A、 when a tablespace is dropped and you have only RMAN-based backup of the databaseB、 when a table is dropped and stored in the Recycle BinC、 when you are required to recover an existing table to its previous stateD、 when a tablespace is dropped and you have only a user-managed full backup of the database

考题 In which scenario will you perform a user-managed incomplete recovery?()A、 when a table is dropped and stored in the Recycle BinB、when a table is dropped and purged from the Recycle BinC、 when you are required to recover an existing table to its previous stateD、 when you are required to view all the versions of a row of an existing table between a specific time period

考题 In which scenario will you perform an incomplete recovery?()A、 when a table is dropped and stored in the Recycle BinB、 when all the control files are deletedC、 when a member of a multiplexed redo log group is droppedD、 when you are required to recover a table to its previous state

考题 多选题Which two steps are required for a Kompella Layer 2 VPN?()AConfigure a site ID for each CEBConfigure a VPN label for each VPNCConfigure a MP-BGP session to each PEDConfigure an Extended LDP Session to each PE

考题 单选题In which scenario will you perform a cancel-based recovery?()A  when a tablespace is dropped and you have only RMAN-based backup of the databaseB  when a table is dropped and stored in the Recycle BinC  when you are required to recover an existing table to its previous stateD  when a tablespace is dropped and you have only a user-managed full backup of the database

考题 单选题Which type of VPN router is not required to run MPLS?()A Provider Core (P)B Provider Edge (PE)C Customer Edge (CE)D Customer Boundary (CB)

考题 单选题Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A A route-based VPN generally uses less resources than a policy-based VPN.B A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

考题 单选题A policy-based IPsec VPN is ideal for which scenario?()A when you want to conserve tunnel resourcesB when the remote peer is a dialup or remote access clientC when you want to configure a tunnel policy with an action of denyD when a dynamic routing protocol such as OSPF must be sent across the VPN

考题 单选题In which scenario will you perform a user-managed incomplete recovery?()A  when a table is dropped and stored in the Recycle BinB when a table is dropped and purged from the Recycle BinC  when you are required to recover an existing table to its previous stateD  when you are required to view all the versions of a row of an existing table between a specific time period

考题 单选题In JUNOS software, which type of encapsulation is required on a PE router for the CE-facinginterface in a Martini-based VPN?()A ATMB CCCC HDLCD Ethernet

考题 单选题In which scenario will you perform an incomplete recovery?()A  when a table is dropped and stored in the Recycle BinB  when all the control files are deletedC  when a member of a multiplexed redo log group is droppedD  when you are required to recover a table to its previous state

考题 单选题Routing convergence time is which of the following?()A Time required for a VPN connection to occurB Time required by protocols to update their forwarding tables after changes have occurredC Time required for an IDS to detect suspicious softwareD Time required by switch ports to update their link status and transition to the forwarding state

考题 单选题In JUNOS software, which type of encapsulation is required on a PE router for the CE-facing interface in a Martini-based VPN?()A ATMB CCCC HDLCD Ethernet

考题 单选题In JUNOS software, which type of VPN supports IPX and Appletalk?()A Martini based VPN’sB 2547bis based VPN’sC Sham link based VPN’sD Virtual Router based VPN’s

考题 多选题Which two configuration elements are required for a policy-based VPN?()AIKE gatewayBsecure tunnel interfaceCsecurity policy to permit the IKE trafficDsecurity policy referencing the IPsec VPN tunnel

考题 单选题When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? As a Network Engineer, it is necessary for you to know how to implement MPLS VPNs between Customer Edge and Provider Edge routers. Refer to the following descriptions, which one is making sense?()A If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistributionB If using IS-IS as the PE-CE routing protocol, no redistribution is requiredC If using static routes between the CE and PE routers, no redistribution of other VPN routes is requiredD If PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required

考题 多选题Which two configuration elements are required for a route-based VPN?()Asecure tunnel interfaceBsecurity policy to permit the IKE trafficCa route for the tunneled transit trafficDtunnel policy for transit traffic referencing the IPsec VPN