单选题Which statement correctly describes IPsec VPN backup technology?()AThe cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocolBReverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworksCEach Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP addressDThe cypto isakmp keepalive command is used to configure stateless failover

单选题
Which statement correctly describes IPsec VPN backup technology?()
A

The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocol

B

Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworks

C

Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP address

D

The cypto isakmp keepalive command is used to configure stateless failover


参考解析

解析: 暂无解析

相关考题:

Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?() A. AESB. TKIPC. 802.1qD. ISAKMP

You have just configured a static default route on router TK1. What is the purpose of a default route?() A. It is a route to be used when the routing protocol fails.B. It is a route configured by an ISP that sends traffic into a corporate network.C. It is a route used when a packet is destined for a remote network that is not listed in the routing table.D. It is a route manually configured for a specific remote network for which a routing protocol is not configured.E. It is used to send traffic to a stub network.

Which statement about the use of Route Target Rewrite is true?()A、It is mainly used in Intra-AS MPLS VPLS deployments and is configured at the ASBR to avoid misconfiguration of the Route Target assignment for VPN configurationsB、It is mainly used in Inter-AS MPLS VPN deployments and is configured at the ASBR to avoid misconfiguration of the Route Target assignment for VPN configurationsC、It is mainly used in Intra-AS MPLS VPLS deployments and is configured at the Router Reflectorto avoid misconfiguration in Route Target assignment for VPN configurationsD、It is mainly used in Inter-AS MPLS VPLS deployments and is configured at the Router Reflectorto avoid misconfiguration of the Route Target assignment for VPN configurationsE、It is mainly used in Inter-AS MPLS VPLS deployments and is configured at the PE router to avoid to misconfiguration of the Route Target assignment for VPN configurations

What best describes the usage of Route-Target rewrite?()A、Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PErouter in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.B、Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.C、Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.D、None of the above.

Which statement best describes Cisco supervisor engine redundancy using Stateful Switchover?()A、Switchover ensures that Layer 2 through Layer 4 traffic is not interruptedB、Redundancy requires BGP, OSPF, EIGRP, or IS-ISC、Redundancy provides fast supervisor switchover for all Cisco Catalyst 6500 series switchesD、Switchover can be caused by clock synchronization failure between supervisors

Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、DynamicMultipoint VPNE、Group Encrypted Transport VPN

During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A、mode configurationB、the VPN client establishment of an ISAKMP SAC、IPsec quick mode completion of the connectionD、VPN client initiation of the IKE phase 1 process

Which two mechanisms can be used to detect IPsec GRE tunnel failures?()A、Dead Peer Detection (DPD)B、CDPC、isakmp keepalivesD、GRE keepalive mechanismE、The hello mechanism of the routing protocol across the IPsec tunnel

Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()A、They are separate from the central site and use NAT to route through the Internet to the Central SiteB、They are part of the VLANs at the Central Site; they are in the same subnetsC、They use public IP Addresses that are routable through the InternetD、They are in separate subnets but are part of the private address space of the network

When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

When using the Cisco SDM Quick Setup Siteto-Site VPN wizard, which three parameters do you configure?()A、Source interface where encrypted traffic originatesB、IP address for the remote peerC、Transform set for the IPsec tunnelD、Interface for the VPN connection

Which statement correctly describes IPsec VPN backup technology?()A、The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocolB、Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworksC、Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP addressD、The cypto isakmp keepalive command is used to configure stateless failover

Which statement describes Reverse Route Injection (RRI)?()A、A static route that points towards the Cisco Easy VPN server is created on the remote client.B、A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.C、A default route is injected into the route table of the remote client.D、A default route is injected into the route table of the Cisco Easy VPN server.

Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、 AES B、 TKIPC、 802.1qD、 ISAKMP

Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、AESB、TKIPC、802.1qD、ISAKMP

Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A、A route-based VPN generally uses less resources than a policy-based VPN.B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

单选题Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients toact as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A Easy VPNB GRE tunnelingC Virtual Tunnel InterfacesD Dynamic Multipoint VPNE Group Encrypted Transport VPN

单选题Which statement best describes Cisco supervisor engine redundancy using Stateful Switchover?()ASwitchover ensures that Layer 2 through Layer 4 traffic is not interruptedBRedundancy requires BGP, OSPF, EIGRP, or IS-ISCRedundancy provides fast supervisor switchover for all Cisco Catalyst 6500 series switchesDSwitchover can be caused by clock synchronization failure between supervisors

单选题You have just configured a static default route on router TK1. What is the purpose of a default route?()AIt is a route to be used when the routing protocol fails.BIt is a route configured by an ISP that sends traffic into a corporate network.CIt is a route used when a packet is destined for a remote network that is not listed in the routing table.DIt is a route manually configured for a specific remote network for which a routing protocol is not configured.EIt is used to send traffic to a stub network.

单选题Which statement about the use of Route Target Rewrite is true?()AIt is mainly used in Intra-AS MPLS VPLS deployments and is configured at the ASBR to avoid misconfiguration of the Route Target assignment for VPN configurationsBIt is mainly used in Inter-AS MPLS VPN deployments and is configured at the ASBR to avoid misconfiguration of the Route Target assignment for VPN configurationsCIt is mainly used in Intra-AS MPLS VPLS deployments and is configured at the Router Reflectorto avoid misconfiguration in Route Target assignment for VPN configurationsDIt is mainly used in Inter-AS MPLS VPLS deployments and is configured at the Router Reflectorto avoid misconfiguration of the Route Target assignment for VPN configurationsEIt is mainly used in Inter-AS MPLS VPLS deployments and is configured at the PE router to avoid to misconfiguration of the Route Target assignment for VPN configurations

单选题What best describes the usage of Route-Target rewrite?()ARoute-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PErouter in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.BRoute-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.CRoute-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.DNone of the above.

单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A AES B TKIPC 802.1qD ISAKMP

单选题Regarding a route-based versus policy-based IPsec VPN, which statement is true?()AA route-based VPN generally uses less resources than a policy-based VPN.BA route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.CA route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.DA route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

单选题Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()AThey are separate from the central site and use NAT to route through the Internet to the Central SiteBThey are part of the VLANs at the Central Site; they are in the same subnetsCThey use public IP Addresses that are routable through the InternetDThey are in separate subnets but are part of the private address space of the network

单选题Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()AEasy VPNBGRE tunnelingCVirtual Tunnel InterfacesDDynamic Multipoint VPNEGroup Encrypted Transport VPN

单选题Which statement describes Reverse Route Injection (RRI)?()AA static route that points towards the Cisco Easy VPN server is created on the remote client.BA static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.CA default route is injected into the route table of the remote client.DA default route is injected into the route table of the Cisco Easy VPN server.

单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A It is recommended to place the VPN termination device in line with the Enterprise Edge 1B Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7