网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()

  • A、Easy VPN
  • B、GRE tunneling
  • C、Virtual Tunnel Interfaces
  • D、Dynamic Multipoint VPN
  • E、Group Encrypted Transport VPN

参考答案

更多 “Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、Dynamic Multipoint VPNE、Group Encrypted Transport VPN” 相关考题
考题 Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A. Easy VPNB. GRE tunnelingC. Virtual Tunnel InterfacesD. DynamicMultipoint VPNE. Group Encrypted Transport VPN

考题 A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted

考题 Cisco Configuration Assistant supports a variety of virtual private networks. Which three types of VPN can be configured by using CCA?()A、 DMVPNB、 MPLS VPNC、 IPv6 VPND、 Cisco IOS SSL VPNE、 site-to-site VPNF、 Cisco Easy VPN

考题 Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()A、Cisco IOS IPsec/SSL VPN clientB、Cisco VPN ClinetC、ISDN terminal adapterD、Cisco Adaptive Security Appliance

考题 Which security-enabled device is recommended to provide a site-to-site IPsec VPN solution, but not SSL?()A、 Cisco Integrated Service RoutersB、 Cisco ASA 5500 Series Security ApplianceC、 CiscoWebVPN Services ModuleD、 CiscoIPsec VPN Module

考题 For which two reasons are Integrated Services Routers well-positioned for the SMB market?()A、They are integrated with firewall capabilities.B、They scan packets for malicious activity.C、They offer superior site-to-site routing.D、They require no configuration to install.E、They offer the best choice for remote access needs.

考题 Which of the following versions of AIX provide both multi-path I/O and dynamic LPAR?()A、AIX V5.2B、AIX V4.2C、AIX V4.3D、AIX V5.1

考题 Which command is used to list information about each physical volume in volume group testvg?()A、lsvg -p testvgB、lspv -v testvgC、lslv -l testvgD、lsattr -v testvg

考题 Which command would an administrator use to list which filesystems are in volume group datavg?()A、lspv datavgB、lslv -a datavgC、lsfs -v datavgD、lsvg -l datavg

考题 Which of the following choices identifies a database component that will be used for multiplexing control files?()A、V$CONTROLFILE B、V$DATABASE C、init.ora D、DBA FILES

考题 Which view provides information on the backup status of the datafiles in the database?()  A、 V$BACKUPB、 V$BACKUP_STATUSC、 V$BACKUP_DATAFILED、 V$DATAFILE_BACKUPE、 V$TABLESPCE_BACKUP

考题 Which data dictionary views displays the error information related to a data file, when an internal read fails on that file?()A、V$DATAFILEB、V$DATAFILE_HEADERC、DBA_DATA_FILESD、V$DBFILEE、V$DATAFILE_ERRORS

考题 Which of the following views must you query to identify any corrupt data file blocks that have been detected during backup set creation?()A、V$COPY_CORRUPTB、V$COPY_CORRUPTIONC、V$BACKUP_CORRUPTD、V$BACKUP_CORRUPTION

考题 Which dynamic view displays the status of block-change tracking?()A、V$BLOCK_CHANGE B、V$BLOCK_CHANGE_TRACKING C、V$BLOCKCHANGE D、V$BLOCK_TRACKING

考题 Which of the following dynamic view would you query to identify the online CURRENT redo log group?()A、V$LOGB、V$LOFHISTC、V$LOGFILED、V$LOG_HISTORY

考题 An administrator named Admin1 plans to implement the planned App-V deployment. You need to recommend which protocol to use for the App-V deployment. Which protocol should you recommend?()A、SMBB、HTTPSC、CIFSD、RTSPS

考题 You plan to deploy an application by using Microsoft Application Virtualization (App-V) in standalone mode. You need to recommend which App-V components are required for the planned deployment. Which components should you recommend?()A、the App-V ClientB、the App-V Management ServerC、the App-V SequencerD、the App-V Management ConsoleE、the App-V Streaming Server

考题 多选题Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site VPNs?()Aallows dynamic routing over the tunnelBsupports multi-protocol (non-IP) traffic over the tunnelCreduces IPsec headers overhead since tunnel mode is usedDsimplifies the ACL used in the crypto mapEuses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration

考题 多选题Which of the following routing protocols are less likely prone to problems in non contiguous networks?()AIGRPBICMPCOSPFDRIP v1ERIP v2FEIGRP

考题 单选题Which IOS security feature is configured by the ip inspect inspection-name {in | out} command?()A IPsec site-to-site VPNB Cisco AutoSecureC Cisco IOS FirewallD IPS

考题 多选题Which of the following are troubleshooting targets common to both site-to-site and remote-accessVPNs?(Choose all that apply.)()ARouting loopsBMisconfiguration of VPN end pointsCOveriapping IP address spaceDDMVPNEUser profilesFMTU

考题 单选题Which view provides information on the backup status of the datafiles in the database?()A  V$BACKUPB  V$BACKUP_STATUSC  V$BACKUP_DATAFILED  V$DATAFILE_BACKUPE  V$TABLESPCE_BACKUP

考题 多选题For which two reasons are Integrated Services Routers well-positioned for the SMB market?()AThey are integrated with firewall capabilities.BThey scan packets for malicious activity.CThey offer superior site-to-site routing.DThey require no configuration to install.EThey offer the best choice for remote access needs.

考题 多选题What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()Aall traffic is encrypted using IPSec and the Triple-DES algorithmBfull support for all Enterprise applications, including data, voice, and videoCthousands of Teleworker VPN tunnels can be aggregated to a headquarters locationDthe VPN tunnel is an always on site-to-site VPN connectionEportability for use while travelingFused with broadband Cable/DSL subscriptions

考题 多选题Which of the following are common issues that should be considered when establishing ortroubleshooting site-to-site VPNs?(Choose all that apply.)()AUser authenticationBOverlapping IP address spaceCGRE or IPsec configurationDMTU sizeEVPN client softwareFAuthentication server configured ly

考题 多选题You plan to deploy an application by using Microsoft Application Virtualization (App-V) in standalone mode. You need to recommend which App-V components are required for the planned deployment. Which components should you recommend?()Athe App-V ClientBthe App-V Management ServerCthe App-V SequencerDthe App-V Management ConsoleEthe App-V Streaming Server