多項選擇題Users of a site-to-site VPN are reporting performance problems. The VPN connection employsIPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem?()

A. Employ path MTU discovery.
B. Set the MTU higher than 1500 bytes.
C. Turn off pre-fragmentation for IPSec.
D. Set the MTU value to 1400 bytes.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientlessend-user devices?()

A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.

2.多項選擇題What are two design guidelines for VoIP networks?()

A. Delay should be no more than 10 ms.
B. Loss should be no more than 1 percent.
C. Jitter should be less then 40 ms.
D. Managed bandwidth is strongly recommended for voice control traffic.

4.多項選擇題What are three primary activities in the cycle of building an enterprise security strategy?()

A. activity audit
B. administration
C. policy establishment
D. technology implementation

5.多項選擇題Which two of these are recommended practices with trunks? ()

A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network 
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

6.單項選擇題When is the site-to-site remote access model appropriate? ()

A. for multiple ISDN connections
B. for modem concentrated dial-up connections
C. for a group of users in the same vicinity sharing a connection
D. for use by mobile users

10.單項選擇題You are the Cisco Network Designer. Which of these is least important when determining howmany users a NAS can support?()

A. bandwidth
B. number of plug-ins per scan
C. total number of network devices
D. number of checks in each posture assessment

最新試題

Which two of these correctly describe Fibre Channel?()

題型:多項選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:單項選擇題

Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()

題型:多項選擇題

Which statement about data center access layer design modes is correct?()

題型:單項選擇題

Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()

題型:多項選擇題

Which two statements about Network Attached Storage are correct?()

題型:多項選擇題

Which two statements about an interface configured with the asr-group command are correct? ()

題型:多項選擇題

At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()

題型:單項選擇題

To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()

題型:單項選擇題

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?() 

題型:多項選擇題