Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()
A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router
D.Cisco VPN3002 Hardware Client
E.Cisco ubr925 cable modem
F.Cisco SW VPN Client
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. Given the topology shown, what are two ways to allow the VPN to operate?()
A.Use route maps on the 831
B.The 831 has IPSec NAT-Transparency (NAT-T) enabled
C.Disallow split tunneling on the 831
D.IPSec pass-through must be enabled on the Linksys
E.Use the port-mapping feature on the residential router
A.CiscoWorks VPN Manager
B.deploy Linksys routers with menu-driven configuration
C.Easy VPN client mode
D.disable 802.1x and Auth Proxy on the Teleworker router
A.RSVP is a required configuration to support conference calls without voice packet loss.
B.The QoS configuration on the 831 router must always provision sufficient bandwidth for two RTP streams.
C.Call admission control is an issue only when using hardware DSP resources.
D.When using the conference call features on a 7960 IP phone, only one RTP stream is present regardless of how many extensions are on the conference.
Refer to the exhibit. Given this deployment model, what capability must the Broadband Router provide for the Enterprise applications to function properly?()
A.IPSec tunnel termination
B.DHCP
C.hardware-accelerated IPSec encryption
D.Traffic Shaping
E.Split-tunneling
A.No additional steps are required.
B.Add the appropriate source-interface command.
C.The router cannot access a server in the Enterprise Campus network.
D.The Teleworker Router does not have any client applications; therefore this type of request is not possible.
最新試題
When is an IPSec SA built on the Teleworker Router?()
Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()
A customer wants to TFTP a new image from the corporate network to Flash on the Teleworker router through the IPSec tunnel. How should you configure the Teleworker router?()
A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()
Which statement regarding 802.1X is true?()
What is not a difference between VPN tunnel authentication and per-user authentication?()
A customer wants to deploy the Cisco Business Ready Teleworker solution, but is currently using a traditional (non-IP) PBX for voice services. What would you recommend to this customer?()
Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()
Choose the false statement concerning the use of CiscoWorks Internetwork Performance Monitor (IPM) in a Teleworker deployment.()
An Enterprise customer is concerned about the effort involved in allocating remote network addressing at the Teleworker location. What should you recommend to the customer?()