Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()
A.The remote router would load-balance between peer x.x.x.x and x.y.y.y.
B.Peer x.x.x.x would be attempted first.
C.A round-robin selection is implemented.
D.If the first peer in the list does not respond in 50 milliseconds, the second peer would be selected.
E.There is no pre-determined order of selection.
您可能感興趣的試卷
你可能感興趣的試題
A.all traffic is encrypted using IPSec and the Triple-DES algorithm
B.full support for all Enterprise applications, including data, voice, and video
C.thousands of Teleworker VPN tunnels can be aggregated to a headquarters location
D.the VPN tunnel is an always on site-to-site VPN connection
E.portability for use while traveling
F.used with broadband Cable/DSL subscriptions
Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()
A.ip dhcp pool Client
B.network 10.1.1.0 255.255.255.240
C.default-router 10.1.1.1
D.dns-server 10.2.2.2
E.domain-name cisco.com
F.option 150 ip 10.3.3.3
A.IPM should not be run on a production network.
B.IPM helps verify if a Service Provider is meeting the Service Level Agreement.
C.IPM contains a database that can store data on latency, jitter, and drops of voice packets over a period of weeks or months.
D.The QoS service policy should contain an allocation of sufficient bandwidth in the priority queue (LLQ) for both the SAA probe simulating a voice call and the voice call. If not, voice quality will suffer.
A.Authentication Proxy
B.802.1X
C.Context-Based Access Control
D.Intrusion Detection System
E.Stateful firewall
A.IPSec
B.IPSec with GRE
C.DMVPN
D.EZVPN
E.all of the choices
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()
A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router
D.Cisco VPN3002 Hardware Client
E.Cisco ubr925 cable modem
F.Cisco SW VPN Client
Refer to the exhibit. Given the topology shown, what are two ways to allow the VPN to operate?()
A.Use route maps on the 831
B.The 831 has IPSec NAT-Transparency (NAT-T) enabled
C.Disallow split tunneling on the 831
D.IPSec pass-through must be enabled on the Linksys
E.Use the port-mapping feature on the residential router
A.CiscoWorks VPN Manager
B.deploy Linksys routers with menu-driven configuration
C.Easy VPN client mode
D.disable 802.1x and Auth Proxy on the Teleworker router
A.RSVP is a required configuration to support conference calls without voice packet loss.
B.The QoS configuration on the 831 router must always provision sufficient bandwidth for two RTP streams.
C.Call admission control is an issue only when using hardware DSP resources.
D.When using the conference call features on a 7960 IP phone, only one RTP stream is present regardless of how many extensions are on the conference.
Refer to the exhibit. Given this deployment model, what capability must the Broadband Router provide for the Enterprise applications to function properly?()
A.IPSec tunnel termination
B.DHCP
C.hardware-accelerated IPSec encryption
D.Traffic Shaping
E.Split-tunneling
最新試題
What are the DSL-specific factors that require additional bandwidth when supporting Voice-over-IP over an IPSec VPN?()
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
What is not a difference between VPN tunnel authentication and per-user authentication?()
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()
Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()
Refer to the exhibit. Given this DSL router's sub-interface configuration, select the two true statements. Assume the interface is UP/UP.()
A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()
Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()
When is it appropriate to enable Link Fragmentation and Interleaving (LFI) on DSL connections for Teleworkers?()
Refer to the exhibit. Given the topology shown, what are two ways to allow the VPN to operate?()