A.IP phone extensions for teleworkers must be chosen carefully so not to duplicate campus phone extensions.
B.More security exposure exists due to lack of support for Intrusion Detection System and URL filtering for teleworker originated traffic.
C.Compressed RTP and IPSec are not compatible and result in no bandwidth savings.
D.Broadband modems must support Quality of Service for adequate voice quality.
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. The Linksys router in the diagram is performing pNAT (port network address translation). What hash algorithm should you choose and why?()
A.Use hash MD5 to ensure that IKE works through NAT.
B.Use ah-sha-hmac, as it does not check the integrity of the IP header. The IP header will change due to NAT.
C.Use 3DES, as it will encrypt the IPSec header IP addresses and bypass addressing issues.
D.Use esp-sha-hmac, as it does not check the integrity of the IP header. The IP header will change due to NAT.
Refer to the exhibit. A Teleworker router is deployed behind a broadband Cable service. If the Teleworker router has the configuration shown, what will be the DNS server selected for DHCP clients on the LAN-side interface?()
A.DHCP clients will automatically default to the DNS root servers for all DNS requests in the IP stacks locally.
B.DHCP clients will use the IP set in the option 150 command.
C.DHCP clients will use the DNS entry assigned by the ISP.
D.DHCP clients will have no DNS server set in the IP stack.
A.requires access lists to identify the voice traffic
B.can allow traffic from a device without 802.1X authentication, by MAC address
C.can allow traffic from Cisco IP phones by listening to their CDP advertisements
D.allows all packets marked with a ToS of 5 to bypass authentication
E.allows all IP voice packets to bypass authentication via stateful inspection
A.Upgrade your residential broadband service to at least 768kbps uplink.
B.Switch your home router to use PPP encapsulation.
C.Use the ip tcp adjust-mss interface command.
D.Employ QoS techniques to drop large data packets.
E.Use traffic shaping to interrupt large data packets.
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is().
A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router
D.Cisco VPN3002 Hardware Client
E.Cisco ubr925 cable modem
F.Cisco SW VPN Client
最新試題
What is not a difference between VPN tunnel authentication and per-user authentication?()
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
Refer to the exhibit. Given the topology shown, what are two ways to allow the VPN to operate?()
What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()
Refer to the exhibit. Select the true statement.()
An Enterprise customer is concerned about the effort involved in allocating remote network addressing at the Teleworker location. What should you recommend to the customer?()
When is an IPSec SA built on the Teleworker Router?()
Refer to the exhibit. Given this deployment model, what capability must the Broadband Router provide for the Enterprise applications to function properly?()
Refer to the exhibit. Given the DHCP pool configuration shown on Router A, the Cisco IP phone will not boot up in the Teleworker location. What is missing from the Teleworker DHCP pool configuration?()
Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()