單項(xiàng)選擇題An organization hires a contractor who only needs access to email and a group calendar. They donot need administrator access to the computer. Which VPN model is the most appropriate?()

A. Thin Model
B. Thick Client
C. Port Forwarding
D. Clientless Access
E. Layer 3 Network Access


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Which of these recommended designs provides the highest availability?()

A. map the Layer 2 VLAN number to the Layer 3 subnet
B. control route propagation to edge switches using distribute lists
C. use a Layer 2 distribution interconnection link with HSRP or GLBP
D. use a Layer 3 distribution interconnection link with HSRP or GLBP
E. use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP

2.單項(xiàng)選擇題Which of these is a correct description of SSO?()

A. It will only become active after a software failure.
B. It will only become active after a hardware failure.
C. It requires that Cisco NSF be enabled in order to work successfully.
D. It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby RouteProcessors.

3.單項(xiàng)選擇題Which of these statements is correct regarding SSO and Cisco NSF?()

A. Utilizing Cisco NSF in Layer 2 environments can reduce outages to one to three seconds.
B. Utilizing SSO in Layer 3 environments can reduce outages to one to three seconds.
C. Distribution switches are single points of failure causing outages for the end devices.
D. Utilizing Cisco NSF and SSO in a Layer 2 environment can reduce outages to less than onesecond.
E. NSF and SSO with redundant supervisors have the most impact on outages at the accesslayer.

4.單項(xiàng)選擇題What is the recommended practice when considering VPN termination and firewall placement?()

A. have the firewall and VPN appliance deployed in parallel
B. place the VPN in line with the firewall, with the VPN terminating inside the firewall
C. place the public side of the VPN termination device in the DMZ behind a firewall
D. place the VPN in line with the firewall, with the VPN terminating outside the firewall

5.單項(xiàng)選擇題When a router has to make a rate transition from LAN to WAN, what type of congestion needs should be considered in the network design?()

A. RX-queue deferred
B. TX-queue deferred
C. RX-queue saturation
D. TX-queue saturation
E. RX-queue starvation
F. TX-queue starvation

6.多項(xiàng)選擇題

Which two practices will avoid Cisco Express Forwarding polarization?()

A. The core layer should use default Layer 3 hash information.
B. The core layer should use default Layer 4 hash information.
C. The distribution layer should use default Layer 3 hash information.
D. The distribution layer should use default Layer 4 hash information.
E. The core layer should use Layer 3 and Layer 4 information as input to the Cisco Expressing Forwarding hashing algorithm.
F. The distribution layer should use Layer 3 and Layer 4 information as input into the Cisco Expressing Forwarding hashing algorithm.

7.單項(xiàng)選擇題What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()

A. RADIUS or LDAP
B. an internal router running EIGRP
C. Reverse Route Injection and OSPF or RIPv2
D. the VPN appliance to be deployed in line with the firewall

8.多項(xiàng)選擇題Which two of these are advantages of placing the VPN device parallel to the firewall?()

A. high scalability
B. the design supports a layered security model
C. firewall addressing does not need to change
D. IPsec decrypted traffic is inspected by the firewall
E. there is a centralized point for logging and content inspection

9.多項(xiàng)選擇題Under which two circumstances should Spanning Tree Protocol be implemented? ()

A. to ensure a loop-free topology
B. to protect against user-side loops
C. when a VLAN spans access layer switches
D. for the most deterministic and highly available network topology
E. because of the risk of lost connectivity without Spanning Tree Protocol

10.多項(xiàng)選擇題Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()

A. fewer devices to manage
B. moderate-to-high scalability
C. stateful inspection of decrypted VPN traffic
D. increased bandwidth with additional interfaces
E. decreased complexity as traffic is filtered from the firewall

最新試題

The Cisco NAC Appliance is able to check which three items before allowing network access?()

題型:多項(xiàng)選擇題

Which two statements about Network Attached Storage are correct?()

題型:多項(xiàng)選擇題

In which two locations in an enterprise network can an IPS sensor be placed? ()

題型:多項(xiàng)選擇題

Which three mechanisms are used to secure management traffic from outside IPS sensors?()

題型:多項(xiàng)選擇題

Which signal and noise values will result in the best phone communication with an access point?()

題型:單項(xiàng)選擇題

Which path selection protocol is used by Fibre Channel fabrics?()

題型:單項(xiàng)選擇題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:單項(xiàng)選擇題

Which statement correctly describes a situation in which VRFs are used in the data center?()

題型:單項(xiàng)選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項(xiàng)選擇題

During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()

題型:單項(xiàng)選擇題