网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

What is the recommended practice when considering VPN termination and firewall placement?()

  • A、 have the firewall and VPN appliance deployed in parallel
  • B、 place the VPN in line with the firewall, with the VPN terminating inside the firewall
  • C、 place the public side of the VPN termination device in the DMZ behind a firewall
  • D、 place the VPN in line with the firewall, with the VPN terminating outside the firewall

参考答案

更多 “What is the recommended practice when considering VPN termination and firewall placement?()A、 have the firewall and VPN appliance deployed in parallelB、 place the VPN in line with the firewall, with the VPN terminating inside the firewallC、 place the public side of the VPN termination device in the DMZ behind a firewallD、 place the VPN in line with the firewall, with the VPN terminating outside the firewall” 相关考题
考题 As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A. inline with a firewallB. in a DMZ outside the firewallC. parallel with a firewallD. in a DMZ behind the firewall

考题 What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?() A. RADIUS or LDAPB. an internal router running EIGRPC. Reverse Route Injection and OSPF or RIPv2D. the VPN appliance to be deployed in line with the firewall

考题 What is the recommended practice when considering VPN termination and firewall placement?() A. have the firewall and VPN appliance deployed in parallelB. place the VPN in line with the firewall, with the VPN terminating inside the firewallC. place the public side of the VPN termination device in the DMZ behind a firewallD. place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 Refer to the exhibit. When deploying an MSFC and an FWSM, which statement is correct?() A. Proper placement depends on the VLAN assignment.B. Place it outside the firewall.C. Place it inside the firewall to make design and management easier.D. Place it inside the firewall with multiple context modes connecting to all configured contexts.

考题 What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A、 RADIUS or LDAPB、 an internal router running EIGRPC、 Reverse Route Injection and OSPF or RIPv2D、 the VPN appliance to be deployed in line with the firewall

考题 When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

考题 Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall

考题 Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()A、fewer devices to manageB、moderate-to-high scalabilityC、stateful inspection of decrypted VPN trafficD、increased bandwidth with additional interfacesE、decreased complexity as traffic is filtered from the firewall

考题 As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A、 inline with a firewallB、 in a DMZ outside the firewallC、 parallel with a firewallD、 in a DMZ behind the firewall

考题 Which of the following devices can be installed on individual computers throughout the network?()A、NIPSB、Network-based firewallC、VPN concentratorD、Host-based firewall

考题 Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: °Error 721: The remote computer is not responding.You need to ensure that users can establish a VPN connection. What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.

考题 You deploy a Windows Server 2008 R2 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows 7.The firewall is configured to allow only secured Web communications.You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall.What should you do?()A、Create an IPsec tunnel.B、Create an SSTP VPN connection.C、Create a PPTP VPN connection.D、Create an L2TP VPN connection.

考题 You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server supports only PPTP connections. A firewall protects the VPN server from the Internet. From a remote computer connected to the Internet, you attempt to connect to the VPN server. During the connection attempt, you receive a message that your user name and password are being verified. You then receive the following error message: “Error 721: The remote computer is not responding.”You need to ensure that you can establish a VPN connection to the VPN server from the Internet.  What should you do?()A、On the VPN server, enable LAN routing.B、On the VPN server, create a demand-dial interface.C、On the firewall, allow inbound connections that use TCP port 1701.D、On the firewall, allow inbound connections that use Generic Route Encapsulation (GRE) protocol 47.

考题 You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

考题 You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall.  What should you do ( )?  A、Create an IPsec tunnelB、Create an SSTP VPN connectionC、Create a PPTP VPN connectionD、Create an L2TP VPN connection

考题 You deploy a Windows Server 2008 R2 VPN server behind a firewall. Remote users connect to theVPN by using portable computers that run Windows 7. The firewall is configured to allow only secured Web communications.You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall. What should you do?()A、Create an IPsec tunnel.B、Create an SSTP VPN connection.C、Create a PPTP VPN connection.D、Create an L2TP VPN connection.

考题 单选题What is the recommended practice when considering VPN termination and firewall placement?()A have the firewall and VPN appliance deployed in parallelB place the VPN in line with the firewall, with the VPN terminating inside the firewallC place the public side of the VPN termination device in the DMZ behind a firewallD place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 多选题Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()Aonboard VPN acceleratorBevents correlation and proactive responseChigh-performance AIM VPN modulesDvirtual firewallECisco lOS Firewall and lOS IPSFtransparent firewall

考题 单选题What is the recommended practice when considering VPN termination and firewall placement?()A  have the firewall and VPN appliance deployed in parallelB  place the VPN in line with the firewall, with the VPN terminating inside the firewallC  place the public side of the VPN termination device in the DMZ behind a firewallD  place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 单选题As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A  inline with a firewallB  in a DMZ outside the firewallC  parallel with a firewallD  in a DMZ behind the firewall

考题 单选题What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A RADIUS or LDAPB an internal router running EIGRPC Reverse Route Injection and OSPF or RIPv2D the VPN appliance to be deployed in line with the firewall

考题 单选题You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A  Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B  Allow all inbound VPN traffic to pass through the perimeter firewall only.C  Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D  Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

考题 单选题As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A inline with a firewallB in a DMZ outside the firewallC parallel with a firewallD in a DMZ behind the firewall

考题 单选题You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server supports only PPTP connections. A firewall protects the VPN server from the Internet. From a remote computer connected to the Internet, you attempt to connect to the VPN server. During the connection attempt, you receive a message that your user name and password are being verified. You then receive the following error message: “Error 721: The remote computer is not responding.”You need to ensure that you can establish a VPN connection to the VPN server from the Internet.  What should you do?()A On the VPN server, enable LAN routing.B On the VPN server, create a demand-dial interface.C On the firewall, allow inbound connections that use TCP port 1701.D On the firewall, allow inbound connections that use Generic Route Encapsulation (GRE) protocol 47.

考题 单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A  It is recommended to place the VPN termination device in line with the Enterprise Edge 1B  Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC  VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD  Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

考题 多选题Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()Afewer devices to manageBmoderate-to-high scalabilityCstateful inspection of decrypted VPN trafficDincreased bandwidth with additional interfacesEdecreased complexity as traffic is filtered from the firewall