單項(xiàng)選擇題When is an IPSec SA built on the Teleworker Router?()

A.when the router is booted up
B.when the router administratively does a no shutdown" on the IPSec SA 
C.when traffic matches a line of the access-list tied into the crypto-map in the router configuration, and that particular IPSec SA is not already up 
D.when the ISAKMP SA completes negotiation of all IPSec SAs (one per access-list line in the crypto ACL), it will be brought up immediately


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題A customer wants to deploy the Cisco Business Ready Teleworker solution, but is currently using a traditional (non-IP) PBX for voice services. What would you recommend to this customer?()

A.Deployment of Business Ready Teleworker with VoIP is not recommended.
B.The customer’s existing PBX must first be replaced with Cisco IP Telephony solution.
C.Business Ready Teleworker and Cisco IP Telephony can be deployed in parallel to the existing PBX, integrating the two with trunking.
D.Deployment is recommended only for full-time Teleworkers who have no other corporate phone.

2.單項(xiàng)選擇題What is not a difference between VPN tunnel authentication and per-user authentication?()

A.VPN tunnel authentication is part of the IKE specification. 
B.VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
C.User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
D.802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

3.單項(xiàng)選擇題Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()

A.Inbound packets are permitted only if they are part of a legitimate data flow initiated by a device on the Teleworker home network.
B.All packets are checked for integrity by analyzing their checksum.
C.Every packet is checked to see if it was sent through the VPN tunnel.
D.Every packet is inspected to see if any disallowed URLs are included. URLs are forwarded to the security cache engine for authorization.

4.單項(xiàng)選擇題

Refer to the exhibit. Given the interface configuration on a DSL connection with PPPoE, select the true statement.()

A.The router is limiting the size of TCP and UDP packets. 
B.The configuration implements an effective Layer-2 fragmentation technique.
C.The value of 542 is recommended in several RFCs. 
D.There is another upstream router terminating the PPPoE session.

5.多項(xiàng)選擇題For Ethernet-to-Ethernet routers, such as the Cisco 831 behind a cable modem or DSL bridge, a traffic shaper is configured. This is required since the output 10-Mbps interface will not be congested. Which two statements are true?()

A.The parent policy-map shapes and the child policy-map queues.
B.The mean-rate and burst-size must always be the same value.
C.This will not work without a Dialer interface configured.
D.The shaper provides congestion feedback.

最新試題

When is it appropriate to enable Link Fragmentation and Interleaving (LFI) on DSL connections for Teleworkers?()

題型:多項(xiàng)選擇題

A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()

題型:?jiǎn)雾?xiàng)選擇題

What is not a difference between VPN tunnel authentication and per-user authentication?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Select the true statement.()

題型:?jiǎn)雾?xiàng)選擇題

An Enterprise customer is concerned about the effort involved in allocating remote network addressing at the Teleworker location. What should you recommend to the customer?()

題型:?jiǎn)雾?xiàng)選擇題

It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()

題型:?jiǎn)雾?xiàng)選擇題

An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()

題型:?jiǎn)雾?xiàng)選擇題

Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()

題型:?jiǎn)雾?xiàng)選擇題

In a Teleworker deployment with a single IP phone connected to a Cisco 831 router, select the true statement regarding Call Admission Control.()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Given the DHCP pool configuration shown on Router A, the Cisco IP phone will not boot up in the Teleworker location. What is missing from the Teleworker DHCP pool configuration?()

題型:?jiǎn)雾?xiàng)選擇題