單項(xiàng)選擇題You are the Cisco Network Designer. Which is not major scaling, sizing, and performance consideration for an IPsec design?()

A. connection speed
B. number of remote sites
C. features to be supported
D. types of devices at the remote site


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which three objectives would be met by designing Layer 3 switching in the Campus Backbone of amedium size installation? ()

A. scale to a large size
B. increase router peering
C. provide a flexible topology with no spanning tree loops
D. control broadcasts in the backbone

2.單項(xiàng)選擇題To securely transport EIGRP traffic, a network administrator will build VPNs between sites. Whatis the best method to accomplish the transport of EIGRP traffic?()

A. IPSec in tunnel mode
B. IPSec in transport mode
C. GRE with IPSec in transport mode
D. GRE with IPSec in tunnel mode

3.單項(xiàng)選擇題It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()

A. single layer of firewalling
B. multiple layers of firewalling
C. firewall connections in either an active or standby state
D. an architecture in which all traffic between firewalls goes through application-specific servers

5.單項(xiàng)選擇題You are the Cisco Network Designer in Cisco.com. Which statement is correct regarding NBARand NetFlow?()

A. NBAR examines data in Layers 1 and 4.
B. NBAR examines data in Layers 3 and 4.
C. NetFlow examines data in Layers 3 and 4.
D. NBAR examines data in Layers 2 through 4.

7.單項(xiàng)選擇題You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientlessend-user devices?()

A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.

8.多項(xiàng)選擇題What are two design guidelines for VoIP networks?()

A. Delay should be no more than 10 ms.
B. Loss should be no more than 1 percent.
C. Jitter should be less then 40 ms.
D. Managed bandwidth is strongly recommended for voice control traffic.

10.多項(xiàng)選擇題What are three primary activities in the cycle of building an enterprise security strategy?()

A. activity audit
B. administration
C. policy establishment
D. technology implementation

最新試題

Which two statements about Cisco Security Management Suite are correct? ()

題型:多項(xiàng)選擇題

What are two characteristics of OER? ()

題型:多項(xiàng)選擇題

How many channels are defined in the IEEE 802.11b DSSS channel set?()

題型:?jiǎn)雾?xiàng)選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:?jiǎn)雾?xiàng)選擇題

During consultation, you find that a customer has only a single asset closet and is looking for asolution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()

題型:?jiǎn)雾?xiàng)選擇題

What are two characteristics of GSS? ()

題型:多項(xiàng)選擇題

Which two of these correctly describe Fibre Channel?()

題型:多項(xiàng)選擇題

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()

題型:多項(xiàng)選擇題

Which statement about Fibre Channel communications is correct?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?() 

題型:多項(xiàng)選擇題