网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()
A

mode configuration

B

the VPN client establishment of an ISAKMP SA

C

IPsec quick mode completion of the connection

D

VPN client initiation of the IKE phase 1 process


参考答案

参考解析
解析: 暂无解析
更多 “单选题During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A mode configurationB the VPN client establishment of an ISAKMP SAC IPsec quick mode completion of the connectionD VPN client initiation of the IKE phase 1 process” 相关考题
考题 In which phase of the software engineering process is the Software Requirements Specification developed?A. definition phaseB.engineeringC.maintenanceD.development phase

考题 A route-based VPN is required for which scenario? () A. when the remote VPN peer is behind a NAT deviceB. when multiple networks need to be reached across the tunnelC. when the remote VPN peer is a dialup or remote access clientD. when a dynamic routing protocol such as OSPF is required across the VPN

考题 During which phase is a proposal developed and delivered? () A.PrepareB.PlanC.DesignD.Operate

考题 Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A. Easy VPNB. GRE tunnelingC. Virtual Tunnel InterfacesD. DynamicMultipoint VPNE. Group Encrypted Transport VPN

考题 The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.system charter B.system scope definition C.system blueprint D.system requirements document

考题 The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.systems planning phase B.systems modeling phase C.systems analysis phase D.systems design phase

考题 The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.application architecture B.system datA.model C.system process model D.implement environment

考题 Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、DynamicMultipoint VPNE、Group Encrypted Transport VPN

考题 During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A、mode configurationB、the VPN client establishment of an ISAKMP SAC、IPsec quick mode completion of the connectionD、VPN client initiation of the IKE phase 1 process

考题 Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、Dynamic Multipoint VPNE、Group Encrypted Transport VPN

考题 Which statement describes Reverse Route Injection (RRI)?()A、A static route that points towards the Cisco Easy VPN server is created on the remote client.B、A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.C、A default route is injected into the route table of the remote client.D、A default route is injected into the route table of the Cisco Easy VPN server.

考题 Why is NTP an important component when implementing IPSec VPN in a PKI environment?()A、 To ensure the router has the correct time when generating its private/public key pairs.B、 To ensure the router has the correct time when checking certificate validity from the remote peersC、 To ensure the router time is sync with the remote peers for encryption keys generationD、 To ensure the router time is sync with the remote peers during theDH exchangeE、 To ensure the router time is sync with the remote peers when generating the cookies during IKE phase 1

考题 During which phase of the boot process is the rootvg volume group varied on and the root file system (hd4) checked?()  A、Boot phase 1B、Boot phase 2C、Boot phase 3D、Boot phase 4

考题 During which boot phase is the rootvg first activated()A、Phase 1B、Phase 2C、Phase 3D、POST Phase

考题 A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used

考题 You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server supports only PPTP connections. A firewall protects the VPN server from the Internet. From a remote computer connected to the Internet, you attempt to connect to the VPN server. During the connection attempt, you receive a message that your user name and password are being verified. You then receive the following error message: “Error 721: The remote computer is not responding.”You need to ensure that you can establish a VPN connection to the VPN server from the Internet.  What should you do?()A、On the VPN server, enable LAN routing.B、On the VPN server, create a demand-dial interface.C、On the firewall, allow inbound connections that use TCP port 1701.D、On the firewall, allow inbound connections that use Generic Route Encapsulation (GRE) protocol 47.

考题 单选题Which statement describes Reverse Route Injection (RRI)?()A A static route that points towards the Cisco Easy VPN server is created on the remote client.B A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.C A default route is injected into the route table of the remote client.D A default route is injected into the route table of the Cisco Easy VPN server.

考题 多选题When using the Cisco SDM Quick Setup Siteto-Site VPN wizard, which three parameters do you configure?()ASource interface where encrypted traffic originatesBIP address for the remote peerCTransform set for the IPsec tunnelDInterface for the VPN connection

考题 单选题A route-based VPN is required for which scenario? ()A when the remote VPN peer is behind a NAT deviceB when multiple networks need to be reached across the tunnelC when the remote VPN peer is a dialup or remote access clientD when a dynamic routing protocol such as OSPF is required across the VPN

考题 多选题As a network administrator, you are required to configure a switch port for a private Virtual LAN. In such a situation, which three of the following connection modes will be available during the configuration process? ()(Choose three.)Aisolated modeBmodular modeCcommunity modeDpromiscuous modeEnon-isolatedFpermanent

考题 单选题Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients toact as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A  Easy VPNB  GRE tunnelingC  Virtual Tunnel InterfacesD  Dynamic Multipoint VPNE  Group Encrypted Transport VPN

考题 单选题What is the benefit of using the Cisco Easy VPN Server feature along with the Cisco software VPN client for implementing remote-access VPNs? ()A  The Cisco Easy VPN Server feature and the Cisco software VPN client use the same GUI configuration tool to simplify remote-access VPN configurations.B  The Cisco Easy VPN Server feature allows the Cisco software VPN client to receive its security policies from the central site VPN device. This minimizes the configuration requirements at the remote location for large remote access VPN deployments.C  The Cisco Easy VPN Server feature and the Cisco software VPN client use hardware-based encryption to reduce the CPU overhead of the central site VPN router.D  The Cisco Easy VPN Server feature and the Cisco software VPN client enable scalable remote-access VPNs deployment by using a thick client/thin server model where the central site VPN router can handle thousands of incoming VPN connections.

考题 单选题You deploy a Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack.  The firewall is configured to allow only secured Web communications. You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall.What should you do?()A Create an IPsec tunnel.B Create an SSTP VPN connection.C Create a PPTP VPN connection.D Create an L2TP VPN connection.

考题 多选题Which three statements about the Cisco Easy VPN feature are true?()AIf the VPN server is configured for Xauth, the VPN client waits for a username / password challenge.BThe Cisco Easy VPN feature only supports transform sets that provide authentication and encryption.CThe VPN client initiates aggressive mode (AM) if a pre-shared key is used for authentication during the IKE phase 1 process.DThe VPN client verifies a server username/password challenge by using a AAA authentication server that supports TACACS+ or RADIUS.EThe VPN server can only be enabled on Cisco PIX Firewalls and Cisco VPN 3000 series concentrators.FWhen connecting with a VPN client,the VPN server must be configured for ISAKMP group 1,2 or 5.

考题 单选题Why is NTP an important component when implementing IPSec VPN in a PKI environment?()A  To ensure the router has the correct time when generating its private/public key pairs.B  To ensure the router has the correct time when checking certificate validity from the remote peersC  To ensure the router time is sync with the remote peers for encryption keys generationD  To ensure the router time is sync with the remote peers during theDH exchangeE  To ensure the router time is sync with the remote peers when generating the cookies during IKE phase 1

考题 单选题During which phase is a proposal developed and delivered?()A PrepareB PlanC DesignD Operate

考题 单选题You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server supports only PPTP connections. A firewall protects the VPN server from the Internet. From a remote computer connected to the Internet, you attempt to connect to the VPN server. During the connection attempt, you receive a message that your user name and password are being verified. You then receive the following error message: “Error 721: The remote computer is not responding.”You need to ensure that you can establish a VPN connection to the VPN server from the Internet.  What should you do?()A On the VPN server, enable LAN routing.B On the VPN server, create a demand-dial interface.C On the firewall, allow inbound connections that use TCP port 1701.D On the firewall, allow inbound connections that use Generic Route Encapsulation (GRE) protocol 47.