网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
A

 RADIUS or LDAP

B

 an internal router running EIGRP

C

 Reverse Route Injection and OSPF or RIPv2

D

 the VPN appliance to be deployed in line with the firewall


参考答案

参考解析
解析: 暂无解析
更多 “单选题What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A  RADIUS or LDAPB  an internal router running EIGRPC  Reverse Route Injection and OSPF or RIPv2D  the VPN appliance to be deployed in line with the firewall” 相关考题
考题 Your network contains two Active Directory forests named contoso.com and fabrikam.com.You have a standalone Network Policy Server (NPS) named NPS1.You have a VPN server named VPN1. VPN1 is configured as a RADIUS client to NPS1.You need to ensure that users from both forests can establish VPN connections by using their own domain accounts.What should you do?()A. On NPS1, configure remediation server groups.B. On NPS1, configure connection request policies.C. On VPN1, modify the DNS suffix search order.D. On VPN1, modify the IKEv2 Client connection controls.

考题 In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?() A. Easy VPNB. GRE tunnelingC. Virtual Tunnel InterfacesD. DynamicMultipoint VPNE. Group Encrypted Transport VPN

考题 Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A. Easy VPNB. GRE tunnelingC. Virtual Tunnel InterfacesD. DynamicMultipoint VPNE. Group Encrypted Transport VPN

考题 An Enterprise customer is concerned about the effort involved in allocating remote network addressing at the Teleworker location. What should you recommend to the customer?()A、CiscoWorks VPN ManagerB、Easy VPN client modeC、deploy Linksys routers with menu driven configurationD、disable 802.1x and Auth Proxy on the Teleworker router

考题 In which tunnel-less VPN topology do group members register with a key server in order to receivethe security association necessary to communicate with the group?()A、 Easy VPNB、 GRE tunnelingC、 Virtual Tunnel InterfacesD、 Dynamic Multipoint VPNE、 Group Encrypted Transport VPN

考题 What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A、 RADIUS or LDAPB、 an internal router running EIGRPC、 Reverse Route Injection and OSPF or RIPv2D、 the VPN appliance to be deployed in line with the firewall

考题 Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、DynamicMultipoint VPNE、Group Encrypted Transport VPN

考题 During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A、mode configurationB、the VPN client establishment of an ISAKMP SAC、IPsec quick mode completion of the connectionD、VPN client initiation of the IKE phase 1 process

考题 In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、DynamicMultipoint VPNE、Group Encrypted Transport VPN

考题 Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、Dynamic Multipoint VPNE、Group Encrypted Transport VPN

考题 Which statement describes Reverse Route Injection (RRI)?()A、A static route that points towards the Cisco Easy VPN server is created on the remote client.B、A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.C、A default route is injected into the route table of the remote client.D、A default route is injected into the route table of the Cisco Easy VPN server.

考题 What is the objective of the Cisco Compatible Extensions program?()A、to provide access to proprietary Cisco IOS software code in order to expand the number of vendors writing wireless codeB、to provide Cisco engineers with the opportunity to certify that any wireless devices that are made by third parties are compatible with Cisco wireless productsC、to provide customers with a broad range of WLAN client devices that have been tested for interoperability with Cisco Aironet innovationsD、to provide third parties with Cisco hardware in order to encourage the development of radical innovation in the area of wireless

考题 An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()A、CiscoWorks VPN Manager B、deploy Linksys routers with menu-driven configurationC、Easy VPN client mode D、disable 802.1x and Auth Proxy on the Teleworker router

考题 You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

考题 You are designing a VPN Server strategy to meet the business and technical requirement.  What should you do? ()A、 Configure all client computers to point to a VPN server in Amsterdam.B、 Configure all client computers to use Multilink Bandwidth Allocation Protocol (BAP).C、 Create a network Load Balancing cluster of VPN servers.D、 Create a shutdown script for the VPN servers to delete the host(A) resource record of the VPN sever from the DNS database when the VPN server are shutdown.

考题 单选题Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A Easy VPNB GRE tunnelingC Virtual Tunnel InterfacesD Dynamic Multipoint VPNE Group Encrypted Transport VPN

考题 单选题Which statement describes Reverse Route Injection (RRI)?()A A static route that points towards the Cisco Easy VPN server is created on the remote client.B A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.C A default route is injected into the route table of the remote client.D A default route is injected into the route table of the Cisco Easy VPN server.

考题 多选题When comparing CPE and provider-provisioned VPNs (PPVPN), which two statements are true?()ACPE VPN’s require dedicated VPN aware hardware at customer site, PPVPN does not.BPPVPN’s require dedicated VPN aware hardware at customer site, CPE VPN’s does not.CCPE VPN’s scale better than PPVPN’s as they do not require a per site configuration on the CPEDPPVPN’s scale better than CPE VPN’s as they do not require a per site configuration on the CPE

考题 单选题What is the objective of the Cisco Compatible Extensions program?()A to provide access to proprietary Cisco IOS software code in order to expand the number of vendors writing wireless codeB to provide Cisco engineers with the opportunity to certify that any wireless devices that are made by third parties are compatible with Cisco wireless productsC to provide customers with a broad range of WLAN client devices that have been tested for interoperability with Cisco Aironet innovationsD to provide third parties with Cisco hardware in order to encourage the development of radical innovation in the area of wireless

考题 单选题Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients toact as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A  Easy VPNB  GRE tunnelingC  Virtual Tunnel InterfacesD  Dynamic Multipoint VPNE  Group Encrypted Transport VPN

考题 单选题What is the benefit of using the Cisco Easy VPN Server feature along with the Cisco software VPN client for implementing remote-access VPNs? ()A  The Cisco Easy VPN Server feature and the Cisco software VPN client use the same GUI configuration tool to simplify remote-access VPN configurations.B  The Cisco Easy VPN Server feature allows the Cisco software VPN client to receive its security policies from the central site VPN device. This minimizes the configuration requirements at the remote location for large remote access VPN deployments.C  The Cisco Easy VPN Server feature and the Cisco software VPN client use hardware-based encryption to reduce the CPU overhead of the central site VPN router.D  The Cisco Easy VPN Server feature and the Cisco software VPN client enable scalable remote-access VPNs deployment by using a thick client/thin server model where the central site VPN router can handle thousands of incoming VPN connections.

考题 单选题During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A mode configurationB the VPN client establishment of an ISAKMP SAC IPsec quick mode completion of the connectionD VPN client initiation of the IKE phase 1 process

考题 多选题Which three statements about the Cisco Easy VPN feature are true?()AIf the VPN server is configured for Xauth, the VPN client waits for a username / password challenge.BThe Cisco Easy VPN feature only supports transform sets that provide authentication and encryption.CThe VPN client initiates aggressive mode (AM) if a pre-shared key is used for authentication during the IKE phase 1 process.DThe VPN client verifies a server username/password challenge by using a AAA authentication server that supports TACACS+ or RADIUS.EThe VPN server can only be enabled on Cisco PIX Firewalls and Cisco VPN 3000 series concentrators.FWhen connecting with a VPN client,the VPN server must be configured for ISAKMP group 1,2 or 5.

考题 单选题What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A RADIUS or LDAPB an internal router running EIGRPC Reverse Route Injection and OSPF or RIPv2D the VPN appliance to be deployed in line with the firewall

考题 单选题Your network contains two Active Directory forests named contoso.com and fabrikam.com.You have a standalone Network Policy Server (NPS) named NPS1.You have a VPN server named VPN1. VPN1 is configured as a RADIUS client to NPS1.You need to ensure that users from both forests can establish VPN connections by using their own domain accounts.What should you do?()A On NPS1, configure remediation server groups.B On NPS1, configure connection request policies.C On VPN1, modify the DNS suffix search order.D On VPN1, modify the IKEv2 Client connection controls.

考题 单选题In which tunnel-less VPN topology do group members register with a key server in order to receivethe security association necessary to communicate with the group?()A  Easy VPNB  GRE tunnelingC  Virtual Tunnel InterfacesD  Dynamic Multipoint VPNE  Group Encrypted Transport VPN

考题 单选题You are designing a VPN Server strategy to meet the business and technical requirement.  What should you do? ()A  Configure all client computers to point to a VPN server in Amsterdam.B  Configure all client computers to use Multilink Bandwidth Allocation Protocol (BAP).C  Create a network Load Balancing cluster of VPN servers.D  Create a shutdown script for the VPN servers to delete the host(A) resource record of the VPN sever from the DNS database when the VPN server are shutdown.