网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

What is a key benefit of using a GRE tunnel to provide connectivity bet ween branch offices and headquarters?()

  • A、authentication, integrity checking, and confidentiality
  • B、less overhead
  • C、dynamic routing over the tunnel
  • D、granular QoS support
  • E、open standard
  • F、scalability

参考答案

更多 “What is a key benefit of using a GRE tunnel to provide connectivity bet ween branch offices and headquarters?()A、authentication, integrity checking, and confidentialityB、less overheadC、dynamic routing over the tunnelD、granular QoS supportE、open standardF、scalability” 相关考题
考题 All three types of cryptography schemes have unique function mapping to specific applications. For example, the symmetric key( ) approach is typically used for the encryption of data providing ( ) , whereas asymmetric key cryptography is mainly used in key ( ) and nonrepudiation , thereby providing confidentiality and authentication. The hash ( ) (noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message ( ) and identity of peers during transport over insecure channels.A.CryptographyB.decodeC.privacyD.security@@@SXB@@@A.ConductionB.confidenceC.confidentialityD.connection@@@SXB@@@A.AuthenticationB.structureC.encryptionD.exchange@@@SXB@@@A.AlgorithmB.SecureC.structureD.encryption@@@SXB@@@A.ConfidentialityB.integrityC.serviceD.robustness

考题 Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network.Which of the following answers best describes the router‘s logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()A. When the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceB. When routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceC. When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceD. When permitted by an ACL that was referenced in the associated crypto map

考题 Refer to the exhibit. Which interoperability technique implemented on the dual - stack routers would allow connectivity between IPv6 sites across automatic created tunnels using the 2002::/16 prefix? ()A. Dual StackB. NAT - PTC. 6to4 tunnelD. GRE tunnelE. ISATAP tunnel

考题 What is a key benefit of using a GRE tunnel to provide connectivity bet ween branch offices and headquarters?() A. authentication, integrity checking, and confidentialityB. less overheadC. dynamic routing over the tunnelD. granular QoS supportE. open standardF. scalability

考题 Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?() A. DMVPNB. MPLS VPNC. Virtual Tunnel Interface (VTI)D. SSL VPNE. PPPoE

考题 All three types of cryptography schemes have unique function mapping to specific.For example,the symmetric key approach( )is typically used for the encryption of data providing( ),whereas asymmetric key cryptography is maidy used in key( )and nonrepudiation,thereby providing confidentiality and authentication.The hash( )(noncryptic),on the other hand,does not provide confidentiality but provides message integrity,and cryptographic hash algorithms provide message(本题)and identity of peers during transport over insecure channels.A.Confidentiality B.integrity C.service D.robustness

考题 Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()A、DMVPNB、MPLS VPNC、Virtual Tunnel Interface (VTI)D、SSL VPNE、PPPoE

考题 In which tunnel-less VPN topology do group members register with a key server in order to receivethe security association necessary to communicate with the group?()A、 Easy VPNB、 GRE tunnelingC、 Virtual Tunnel InterfacesD、 Dynamic Multipoint VPNE、 Group Encrypted Transport VPN

考题 Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network. Which of the following answers best describes the router's logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()A、When the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceB、When routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceC、When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceD、When permitted by an ACL that was referenced in the associated crypto map

考题 Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, and into the core of an Enterprise network. The branch also allows local hosts to communicate directly with public sites in th e Internet over this same DSL connection. Which of the following answers defines how the branch NAT config avoids performing NAT for the Enterprise directed traffic but does perform NAT for the Internet - directed traffic?()A、By not enabling NAT on the I Psec tunnel interfaceB、By not enabling NAT on the GRE tunnel interfaceC、By configuring the NAT - referenced ACL to not permit the Enterprise trafficD、By asking the ISP to perform NAT in the cloud

考题 When implementing WLAN security, what are three benefits of using the Temporal Key Integrity Protocol (TKIP) instead of WEP? ()A、 TKIP uses an advanced encryption scheme based on AESB、 TKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC)C、 TKIP provides per-packet keyingand a rekeying mechanismD、 TKIP provides message integrity checkE、 TKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipsetF、 TKIP uses a 48 bit InitializationVector

考题 Which two statements about the open and shared key wireless-authentication methods are true? ()A、 Shared key authentication is considered more secure than open authentication.B、 Shared key authentication is considered less secure than open authentication.C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

考题 Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site VPNs?()A、allows dynamic routing over the tunnelB、supports multi-protocol (non-IP) traffic over the tunnelC、reduces IPsec headers overhead since tunnel mode is usedD、simplifies the ACL used in the crypto mapE、uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration

考题 What is an advantage of dynamic routing?()A、Unlike static routing, dynamic routing provides redundant IP addresses for end-user devicesB、Unlike static routing, dynamic routing requires no initial user configurationC、Dynamic routing can provide increased network availability when compared to static routingD、Dynamic routing provides DNS services along with IP connectivity; static routing does not

考题 Which two statements about the open and shared key wireless-authentication methods are true?()A、shared key authentication is considered more secure than open authenticationB、shared key authentication is considered less secure than open authenticationC、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer dataD、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer dataE、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data

考题 On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) isfailing, but association using EAP-PEAP is functioning. What needs to be enabled on the standalone accesspoint to correct this issue?()A、network EAPB、open authentication plus MACC、open authentication plus EAPD、a shared key

考题 What is an advantage of dynamic routing?()A、Unlike static routing, dynamic routing provides redundant IP addresses for end-user devices.B、Unlike static routing, dynamic routing requires no initial user configuration.C、Dynamic routing can provide increased network availability when compared to static routing.D、Dynamic routing provides DNS services along with IP connectivity; static routing does not.

考题 What is an advantage of dynamic routing?()A、Unlike static routing, dynamic routing provides redundant IP addresses for end-user devicesB、Unlike static routing, dynamic routing requires no initial user configurationC、Dynamic routing can provide increased network availability when compared to static routingD、Dynamic routing provides DNS services along with IP connectivity, static does not

考题 our company has a main office and 15 branch offices. The company has a single active directory domain. All servers run windows server 2008.You need to ensure that the VPN connections between the office and the branch offices meet the following requirements:All data must be encrypted by using end-to-end encryption.The vpn connection must use computer-level authentication.User names and passwords cannot be used for authentication.What should do?()A、Configure an ipsec connection to use tunnel mode and preshared key authentication.B、Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.C、Configure a L2TP/IPsec connection to use the EAP-TLS authentication.D、Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.

考题 Your company has a main office and 15 branch offices. The company has a single Active Directory domain. All servers run Windows Server 2008. You need to ensure that the VPN connections between the main office and the branch offices meet the following requirements:All data must be encrypted by using end-to-end encryption. The VPN connection must use computer-level authentication User names and passwords cannot be used for authentication. What should you do?()A、 Configure an IPsec connection to use tunnel mode and preshared key authentication.B、 Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.C、 Configure a L2TP/IPsec connection to use the EAP-TLS authenticationD、 Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.

考题 单选题What is an advantage of dynamic routing?()A Unlike static routing, dynamic routing provides redundant IP addresses for end-user devices.B Unlike static routing, dynamic routing requires no initial user configuration.C Dynamic routing can provide increased network availability when compared to static routing.D Dynamic routing provides DNS services along with IP connectivity; static routing does not.

考题 单选题What is an advantage of dynamic routing?()A Unlike static routing, dynamic routing provides redundant IP addresses for end-user devicesB Unlike static routing, dynamic routing requires no initial user configurationC Dynamic routing can provide increased network availability when compared to static routingD Dynamic routing provides DNS services along with IP connectivity; static routing does not

考题 多选题Which two statements about the open and shared key wireless-authentication methods are true? ()AShared key authentication is considered more secure than open authentication.BShared key authentication is considered less secure than open authentication.CIf the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.DIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.EIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

考题 单选题What is an advantage of dynamic routing?()A Unlike static routing, dynamic routing provides redundant IP addresses for end-user devicesB Unlike static routing, dynamic routing requires no initial user configurationC Dynamic routing can provide increased network availability when compared to static routingD Dynamic routing provides DNS services along with IP connectivity, static does not

考题 单选题What is a key benefit of using a GRE tunnel to provide connectivity bet ween branch offices and headquarters?()A authentication, integrity checking, and confidentialityB less overheadC dynamic routing over the tunnelD granular QoS supportE open standardF scalability

考题 单选题In which tunnel-less VPN topology do group members register with a key server in order to receivethe security association necessary to communicate with the group?()A  Easy VPNB  GRE tunnelingC  Virtual Tunnel InterfacesD  Dynamic Multipoint VPNE  Group Encrypted Transport VPN

考题 多选题Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()ADMVPNBMPLS VPNCVirtual Tunnel Interface (VTI)DSSL VPNEPPPoE