單項選擇題To securely transport EIGRP traffic, a network administrator will build VPNs between sites. Whatis the best method to accomplish the transport of EIGRP traffic?()

A. IPSec in tunnel mode
B. IPSec in transport mode
C. GRE with IPSec in transport mode
D. GRE with IPSec in tunnel mode


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()

A. single layer of firewalling
B. multiple layers of firewalling
C. firewall connections in either an active or standby state
D. an architecture in which all traffic between firewalls goes through application-specific servers

3.單項選擇題You are the Cisco Network Designer in Cisco.com. Which statement is correct regarding NBARand NetFlow?()

A. NBAR examines data in Layers 1 and 4.
B. NBAR examines data in Layers 3 and 4.
C. NetFlow examines data in Layers 3 and 4.
D. NBAR examines data in Layers 2 through 4.

5.單項選擇題You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientlessend-user devices?()

A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.

6.多項選擇題What are two design guidelines for VoIP networks?()

A. Delay should be no more than 10 ms.
B. Loss should be no more than 1 percent.
C. Jitter should be less then 40 ms.
D. Managed bandwidth is strongly recommended for voice control traffic.

8.多項選擇題What are three primary activities in the cycle of building an enterprise security strategy?()

A. activity audit
B. administration
C. policy establishment
D. technology implementation

9.多項選擇題Which two of these are recommended practices with trunks? ()

A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network 
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

10.單項選擇題When is the site-to-site remote access model appropriate? ()

A. for multiple ISDN connections
B. for modem concentrated dial-up connections
C. for a group of users in the same vicinity sharing a connection
D. for use by mobile users