Refer to the exhibit.
What are the two options that are used to provide High Availability IPsec?()
A.RRI
B.IPsec Backup Peerings
C.Dynamic Crypto Ma
D.HSRP
E.IPsec Stateful Switchover (SSO)
F.Dual Router Mode (DRM) IPsec
您可能感興趣的試卷
你可能感興趣的試題
A.Cisco Express Forwarding (CEF) must be enabled as a prerequisite to running MPLS on a Cisco router.
B.Frame-mode MPLS inserts a 32-bit label between the Layer 3 and Layer 4 headers.
C.MPLS is designed for use with frame-based Layer 2 encapsulation protocols such as Frame Relay, but is not supported by ATM because of ATM fixed-length cells.
D.OSPF, EIGRP, IS-IS, RIP, and BGP can be used in the control plane.
E.The control plane is responsible for forwarding packets.
F.The two major components of MPLS include the control plane and the data plane.
Refer to the exhibit, which shows a PPPoA diagram and partial SOHO77 configuration.
Which command needs to be applied to the SOHO77 to complete the configuration?()
A.encapsulation aal5snap applied to the PVC
B.encapsulation aal5ciscoppp applied to the PVC
C.encapsulation aal5ciscoppp applied to the ATM0 interface
D.encapsulation aal5mux ppp dialer applied to the ATM0 interface
E.encapsulation aal5mux ppp dialer applied to the PVC
A.Inoculate systems by applying update patches.
B.Limit traffic rate.
C.Apply authentication.
D.Quarantine infected machines.
E.Enable anti-spoof measures.
A.Transparent tunneling must be enabled.
B.A valid root certificate must be installed.
C.A group pre-shared secret must be properly configured.
D.The option to "Allow Local LAN Access" must be selected.
A.mode configuration
B.the VPN client establishment of an ISAKMP SA
C.IPsec quick mode completion of the connection
D.VPN client initiation of the IKE phase 1 process
最新試題
Refer to the exhibit. Which statement is true about the partial MPLS configuration that is shown?()
Which two statements are true about broadband cable (HFC) systems?()
Which two mechanisms can be used to detect IPsec GRE tunnel failures?()
Refer to the exhibit. Which statement about the authentication process is true?()
What are two possible actions an IOS IPS can take if a packet in a session matches a signature?()
Which three statements about IOS Firewall configurations are true?()
What are two steps that must be taken when mitigating a worm attack?()
Refer to the exhibit. The show mpls interfaces detail command has been used to display information about the interfaces on router R1 that have been configured for label switching. Which statement is true about the MPLS edge router R1?()
What is a reason for implementing MPLS in a network?()
Which three techniques should be used to secure management protocols?()