单选题When is the site-to-site remote access model appropriate? ()A for multiple ISDN connectionsB for modem concentrated dial-up connectionsC for a group of users in the same vicinity sharing a connectionD for use by mobile users

单选题
When is the site-to-site remote access model appropriate? ()
A

 for multiple ISDN connections

B

 for modem concentrated dial-up connections

C

 for a group of users in the same vicinity sharing a connection

D

 for use by mobile users


参考解析

解析: 暂无解析

相关考题:

A route-based VPN is required for which scenario? () A. when the remote VPN peer is behind a NAT deviceB. when multiple networks need to be reached across the tunnelC. when the remote VPN peer is a dialup or remote access clientD. when a dynamic routing protocol such as OSPF is required across the VPN

An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?() A. Thin ModelB. Thick ClientC. Port ForwardingD. Clientless AccessE. Layer 3 Network Access

A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted

When designing the routing for an Enterprise Campus network it is important to keep while of thefollowing filtering aspects in mind?()A、 Filtering is only useful when combined with route summarizationB、 It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networksC、 IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updatesD、 The primary limitation of router filtering is that it can only be applied on outbound updates

When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

An organization hires a contractor who only needs access to email and a group calendar. They donot need administrator access to the computer. Which VPN model is the most appropriate?()A、 Thin ModelB、 Thick ClientC、 Port ForwardingD、 Clientless AccessE、 Layer 3 Network Access

A route-based VPN is required for which scenario? ()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnelC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol such as OSPF is required across the VPN

A policy-based IPsec VPN is ideal for which scenario?()A、when you want to conserve tunnel resourcesB、when the remote peer is a dialup or remote access clientC、when you want to configure a tunnel policy with an action of denyD、when a dynamic routing protocol such as OSPF must be sent across the VPN

When is the site-to-site remote access model appropriate? ()A、for multiple ISDN connectionsB、for modem concentrated dial-up connectionsC、for a group of users in the same vicinity sharing a connectionD、for use by mobile users

For which two reasons are Integrated Services Routers well-positioned for the SMB market?()A、They are integrated with firewall capabilities.B、They scan packets for malicious activity.C、They offer superior site-to-site routing.D、They require no configuration to install.E、They offer the best choice for remote access needs.

A company is looking to improve upon their current remote management capabilities.  Thecompany must ensure that access is removed from all systems when a user is terminated and that administrators can remotely manage a system’s BIOS.  Which of the following remote management systems would support both these requirements?()A、Remote management cardB、Terminal servicesC、Remote desktopD、LDAP enabled IP KVM

When purchasing a UPS for a server room, which of the following are important factors to consider?()A、Network card configurationB、Remote access proceduresC、Estimated runtimeD、Maximum loadE、Power cord length

A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used

You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

单选题You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A Configure each server running Routing and Remote Access as a RADIUS Client.B Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

单选题When is the site-to-site remote access model appropriate? ()Afor multiple ISDN connectionsBfor modem concentrated dial-up connectionsCfor a group of users in the same vicinity sharing a connectionDfor use by mobile users

单选题An organization hires a contractor who only needs access to email and a group calendar. They donot need administrator access to the computer. Which VPN model is the most appropriate?()A Thin ModelB Thick ClientC Port ForwardingD Clientless AccessE Layer 3 Network Access

单选题The PWP teaching model is not considered appropriate in teaching_______.AreadingBlisteningCwritingDvocabulary

多选题A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()AAdd the switch to the Junos Pulse Access Control Service as a standard RADIUS.BAdd the switch to the Junos Pulse Access Control Service using the Any make/model.CAdd the switch as a firewall enforcer.DObtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.

单选题You have a VPN server named Server1 and a file server named Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2). VPN clients report that they cannot access shares on Server2 after connecting to Server1. You confirm that VPN clients receive the appropriate IP configurations and that they have permissions to the shared folders on Server2. You need to ensure that VPN clients can access the shares on Server2 when they connect to the network by using a VPN connection.  What should you do? ()AFrom the Routing and Remote Access snap-in on Server2, enable IP Routing.BFrom the Routing and Remote Access snap-in on Server2, enable Link Control Protocol (LCP) extensions.CFrom Utility Manager on Server1, enable the Start automatically when I log on option.DIn the local security policy on Server2, configure the Network Access: Shares that can be accessed anonymously setting.

多选题For which two reasons are Integrated Services Routers well-positioned for the SMB market?()AThey are integrated with firewall capabilities.BThey scan packets for malicious activity.CThey offer superior site-to-site routing.DThey require no configuration to install.EThey offer the best choice for remote access needs.

单选题What is the benefit of using the Cisco Easy VPN Server feature along with the Cisco software VPN client for implementing remote-access VPNs? ()A The Cisco Easy VPN Server feature and the Cisco software VPN client use the same GUI configuration tool to simplify remote-access VPN configurations.B The Cisco Easy VPN Server feature allows the Cisco software VPN client to receive its security policies from the central site VPN device. This minimizes the configuration requirements at the remote location for large remote access VPN deployments.C The Cisco Easy VPN Server feature and the Cisco software VPN client use hardware-based encryption to reduce the CPU overhead of the central site VPN router.D The Cisco Easy VPN Server feature and the Cisco software VPN client enable scalable remote-access VPNs deployment by using a thick client/thin server model where the central site VPN router can handle thousands of incoming VPN connections.

单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A It is recommended to place the VPN termination device in line with the Enterprise Edge 1B Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

单选题Your network contains two offices named Office1 and Office2. The offices connect to each other by using a demand-dial connection.You add a new subnet in Office2.You need to ensure that a demand-dial connection starts when users attempt to connect to resources in the new Office2 subnet.What should you do from the Remote Routing and Access console?()AFrom the remote access server in Office2, right-click the demand-dial interface and click Connect.BFrom the remote access server in Office1, right-click the demand-dial interface and click Connect.CFrom the remote access server in Office1, right-click the demand-dial interface and click Update Routes.DFrom the remote access server in Office2, right-click the demand-dial interface and click Update Routes.

单选题An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()AThin ModelBThick ClientCPort ForwardingDClientless AccessELayer 3 Network Access

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A Configure the system event log to Do not overwrite.B In IAS, in Remote Access Logging, enable the Authentication requests setting.C Configure the Remote Access server to Log all events.D Create a custom remote access policy and configure it for Authentication-Type.

单选题When designing the routing for an Enterprise Campus network it is important to keep while of thefollowing filtering aspects in mind?()A Filtering is only useful when combined with route summarizationB It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networksC IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updatesD The primary limitation of router filtering is that it can only be applied on outbound updates