Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
A.Twenty bytes of header will be replaced with five bytes.
B.If the IPSec transform set includes Authentication Header, the receiving IPSec peer will discard the packets.
C.The IPSec packets will be dropped by Router A's compression logic.
D.The voice packets will not be compressed.
您可能感興趣的試卷
你可能感興趣的試題
A.A voice packet is sent via multiple fixed-length cells; a portion of the last cell is padding, requiring more bandwidth.
B.ADSL typically uses PPPoE encapsulation, which adds additional overhead to each voice packet.
C.A voice packet is sent via multiple fixed-length cells; each cell has about 10% Layer-2 header overhead.
D.IPSec requires additional overhead for the header and hash.
E.ADSL carrier band requires additional bits to be carried over the wire to the DSL Access Concentrator.
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
A.UDP ports 16384 through 32727
B.ESP packets less than 113 byes
C.DiffServ codepoint EF Expedited Forwarding
D.RTP ports 6970 through 6999
Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()
A.802.1X authentication
B.authentication proxy
C.Context Based Access Control
D.Lock and Key authentication
Refer to the exhibit. Available public Internet sites are sometimes used for estimating performance. Which statement regarding their use for estimating VPN performance is correct?()
A.Throughput results are valid as a value from the Teleworker's home to the corporate site, regardless of the location of the public test server.
B.Throughput results may not be valid due to the public server's location on the Internet and fluctuations based on the use of the public server.
C.Throughput values are not affected by the choice of split tunneling or Internet access through the VPN.
D.Throughput results are unrelated to the Teleworker PC configuration or current PC use.
A.256kbps / 1024kbps
B.256kbps / 1544kbps
C.160kbps / 768kbps
D.384kbps / 384kbps
E.128kbps / 512kbps
A.Process Switching
B.Silicon Switching
C.Cisco Express Forwarding (CEF) Switching
D.Autonomous Switching
A.Access Lists between the inside interface and loopback interface
B.Context Based Access Control
C.Dynamic Host Configuration Protocol
D.Network Address translation
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is _____.()
A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router
D.Cisco VPN3002 Hardware Client
E.Cisco SW VPN Client
A.Issue a show policy-map interface command.
B.Assuming Netflow is enabled, issue a show ip cache verbose flow command.
C.Issue a show crypto ipsec session command.
D.Issue a debug qos set command and a terminal monitor command.
A.IP phone extensions for teleworkers must be chosen carefully so not to duplicate campus phone extensions.
B.More security exposure exists due to lack of support for Intrusion Detection System and URL filtering for teleworker originated traffic.
C.Compressed RTP and IPSec are not compatible and result in no bandwidth savings.
D.Broadband modems must support Quality of Service for adequate voice quality.
最新試題
A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()
Refer to the exhibit. Given this DSL router's sub-interface configuration, select the two true statements. Assume the interface is UP/UP.()
A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()
What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()
Which statement regarding 802.1X is true?()
Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
Refer to the exhibit. Given the DHCP pool configuration shown on Router A, the Cisco IP phone will not boot up in the Teleworker location. What is missing from the Teleworker DHCP pool configuration?()
Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()