單項選擇題

Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()

A.802.1X authentication
B.authentication proxy
C.Context Based Access Control
D.Lock and Key authentication


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

Refer to the exhibit. Available public Internet sites are sometimes used for estimating performance. Which statement regarding their use for estimating VPN performance is correct?()

A.Throughput results are valid as a value from the Teleworker's home to the corporate site, regardless of the location of the public test server. 
B.Throughput results may not be valid due to the public server's location on the Internet and fluctuations based on the use of the public server. 
C.Throughput values are not affected by the choice of split tunneling or Internet access through the VPN. 
D.Throughput results are unrelated to the Teleworker PC configuration or current PC use.

2.單項選擇題What is the minimum recommended uplink/downlink speed to support a single encrypted IP voice Teleworker call?()

A.256kbps / 1024kbps
B.256kbps / 1544kbps
C.160kbps / 768kbps
D.384kbps / 384kbps
E.128kbps / 512kbps

3.單項選擇題For best packet switching performance with crypto, what is the recommend packet switching path in a Cisco Teleworker Router?()

A.Process Switching
B.Silicon Switching 
C.Cisco Express Forwarding (CEF) Switching
D.Autonomous Switching

4.單項選擇題When implementing 802.1X on Teleworker routers and using separate DHCP address pools for Teleworker and Home-user devices, traffic between devices can be restricted. How can you best accomplish this?()

A.Access Lists between the inside interface and loopback interface
B.Context Based Access Control
C.Dynamic Host Configuration Protocol
D.Network Address translation

5.單項選擇題

Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is _____.()

A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router 
D.Cisco VPN3002 Hardware Client
E.Cisco SW VPN Client

6.單項選擇題What method in a Cisco IOS router can confirm that packets marked for a particular QoS marking are being matched?()

A.Issue a show policy-map interface command. 
B.Assuming Netflow is enabled, issue a show ip cache verbose flow command.
C.Issue a show crypto ipsec session command.
D.Issue a debug qos set command and a terminal monitor command.

7.單項選擇題An important limitation of the Cisco Business Ready Teleworker solution is_____.()

A.IP phone extensions for teleworkers must be chosen carefully so not to duplicate campus phone extensions.
B.More security exposure exists due to lack of support for Intrusion Detection System and URL filtering for teleworker originated traffic.
C.Compressed RTP and IPSec are not compatible and result in no bandwidth savings.
D.Broadband modems must support Quality of Service for adequate voice quality.

8.單項選擇題

Refer to the exhibit. The Linksys router in the diagram is performing pNAT (port network address translation). What hash algorithm should you choose and why?()

A.Use hash MD5 to ensure that IKE works through NAT. 
B.Use ah-sha-hmac, as it does not check the integrity of the IP header. The IP header will change due to NAT. 
C.Use 3DES, as it will encrypt the IPSec header IP addresses and bypass addressing issues. 
D.Use esp-sha-hmac, as it does not check the integrity of the IP header. The IP header will change due to NAT.

9.單項選擇題

Refer to the exhibit. A Teleworker router is deployed behind a broadband Cable service. If the Teleworker router has the configuration shown, what will be the DNS server selected for DHCP clients on the LAN-side interface?()

A.DHCP clients will automatically default to the DNS root servers for all DNS requests in the IP stacks locally. 
B.DHCP clients will use the IP set in the option 150 command.
C.DHCP clients will use the DNS entry assigned by the ISP.
D.DHCP clients will have no DNS server set in the IP stack.

10.多項選擇題Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().

A.requires access lists to identify the voice traffic 
B.can allow traffic from a device without 802.1X authentication, by MAC address
C.can allow traffic from Cisco IP phones by listening to their CDP advertisements
D.allows all packets marked with a ToS of 5 to bypass authentication
E.allows all IP voice packets to bypass authentication via stateful inspection

最新試題

What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()

題型:多項選擇題

When IP Telephony is deployed for Teleworkers using the Cisco Business Ready Teleworker solution, which statements are true?()

題型:多項選擇題

A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()

題型:單項選擇題

In a Teleworker deployment with a single IP phone connected to a Cisco 831 router, select the true statement regarding Call Admission Control.()

題型:單項選擇題

Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()

題型:單項選擇題

Which is not a reason that Internet Service Providers prefer to use PPP over Ethernet (PPoE)?()

題型:單項選擇題

Refer to the exhibit. Given this deployment model, what capability must the Broadband Router provide for the Enterprise applications to function properly?()

題型:單項選擇題

Refer to the exhibit. Select the true statement.()

題型:單項選擇題

Refer to the exhibit. Given this DSL router's sub-interface configuration, select the two true statements. Assume the interface is UP/UP.()

題型:多項選擇題

It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()

題型:單項選擇題