A.DSL with 128k uplink /128k downlink
B.cable with 256k uplink /256k downlink
C.DSL with 128k uplink /768k downlink
D.cable with 256k uplink /1.4M downlink
您可能感興趣的試卷
你可能感興趣的試題
A.Remark the traffic on ingress and prioritize on egress.
B.Enable CEF and Netflow.
C.Configure the MS-Windows QoS Scheduler to prioritize this traffic.
D.Enable WRED.
Refer to the exhibit. Given the DHCP pool configuration shown on Router A, the Cisco IP phone will not boot up in the Teleworker location. What is missing from the Teleworker DHCP pool configuration?()
A.The DHCP pool needs to have an import all statement.
B.The DHCP pool is missing an option 150 ip 10.59.138.1 statement.
C.The DHCP pool is missing an option 139 ip 10.59.138.1 statement
D.The DHCP pool is missing a dns-server 10.59.138.1 statement.
Refer to the exhibit. Given this deployment model, what capability must the Broadband Router provide for the Enterprise applications to function properly?()
A.IPSec tunnel termination
B.DHCP
C.hardware-accelerated IPSec encryption
D.Traffic Shaping
E.Split-tunneling
A.all traffic is encrypted using IPSec and the Triple-DES algorithm
B.full support for all Enterprise applications, including data, voice, and video
C.thousands of Teleworker VPN tunnels can be aggregated to a headquarters location
D.the VPN tunnel is an always on site-to-site VPN connection
E.portability for use while traveling
F.used with broadband Cable/DSL subscriptions
A.Authentication Proxy
B.802.1X
C.Context-Based Access Control
D.Intrusion Detection System
E.Stateful firewall
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()
A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router
D.Cisco VPN3002 Hardware Client
E.Cisco ubr925 cable modem
F.Cisco SW VPN Client
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
A.UDP ports 16384 through 32727
B.ESP packets less than 113 byes
C.DiffServ codepoint EF Expedited Forwarding
D.RTP ports 6970 through 6999
Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()
A.The remote router would load-balance between peer x.x.x.x and x.y.y.y.
B.Peer x.x.x.x would be attempted first.
C.A round-robin selection is implemented.
D.If the first peer in the list does not respond in 50 milliseconds, the second peer would be selected.
E.There is no pre-determined order of selection.
A.IPSec
B.IPSec with GRE
C.DMVPN
D.EZVPN
E.all of the choices
A.when the router is booted up
B.when the router administratively does a no shutdown" on the IPSec SA
C.when traffic matches a line of the access-list tied into the crypto-map in the router configuration, and that particular IPSec SA is not already up
D.when the ISAKMP SA completes negotiation of all IPSec SAs (one per access-list line in the crypto ACL), it will be brought up immediately
最新試題
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
When is it appropriate to enable Link Fragmentation and Interleaving (LFI) on DSL connections for Teleworkers?()
An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()
It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()
Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()
Refer to the exhibit. Given this deployment model, what capability must the Broadband Router provide for the Enterprise applications to function properly?()
A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()
Choose the false statement concerning the use of CiscoWorks Internetwork Performance Monitor (IPM) in a Teleworker deployment.()