单选题A route-based VPN is required for which scenario? ()Awhen the remote VPN peer is behind a NAT deviceBwhen multiple networks need to be reached across the tunnelCwhen the remote VPN peer is a dialup or remote access clientDwhen a dynamic routing protocol such as OSPF is required across the VPN

单选题
A route-based VPN is required for which scenario? ()
A

when the remote VPN peer is behind a NAT device

B

when multiple networks need to be reached across the tunnel

C

when the remote VPN peer is a dialup or remote access client

D

when a dynamic routing protocol such as OSPF is required across the VPN


参考解析

解析: 暂无解析

相关考题:

A route-based VPN is required for which scenario? () A. when the remote VPN peer is behind a NAT deviceB. when multiple networks need to be reached across the tunnelC. when the remote VPN peer is a dialup or remote access clientD. when a dynamic routing protocol such as OSPF is required across the VPN

Which type of VPN router is not required to run MPLS?() A. Provider Core (P)B. Provider Edge (PE)C. Customer Edge (CE)D. Customer Boundary (CB)

When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? As a Network Engineer, it is necessary for you to know how to implement MPLS VPNs between Customer Edge and Provider Edge routers. Refer to the following descriptions, which one is making sense?()A、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistributionB、If using IS-IS as the PE-CE routing protocol, no redistribution is requiredC、If using static routes between the CE and PE routers, no redistribution of other VPN routes is requiredD、If PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required

For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()A、Broadband serviceB、Headend VPN deviceC、VPN access deviceD、Tunnel

In JUNOS software, which type of VPN supports IPX and Appletalk?()A、Martini based VPN’sB、2547bis based VPN’sC、Sham link based VPN’sD、Virtual Router based VPN’s

Which two steps are required for a Kompella Layer 2 VPN?()A、Configure a siteid for each ce.B、Configure a VPN label for each VPN.C、Configure a MP-bgp session to each pe.D、Configure an Extended LDP Session to each pe.

When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? ()A、If using IS-IS as the PE-CE routing protocol, no redistribution is required.B、If using static routes between the CE and PE routers, no redistribution of other VPN routes is required.C、If the PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required.D、If RIP is the routing protocol that is used between the PE-CE routers, no redistribution is required, but any other protocol will require redistribution.E、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution.

Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A、A route-based VPN generally uses less resources than a policy-based VPN.B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used

Which two configuration elements are required for a route-based VPN?()A、secure tunnel interfaceB、security policy to permit the IKE trafficC、a route for the tunneled transit trafficD、tunnel policy for transit traffic referencing the IPsec VPN

In which scenario will you perform a cancel-based recovery?()A、 when a tablespace is dropped and you have only RMAN-based backup of the databaseB、 when a table is dropped and stored in the Recycle BinC、 when you are required to recover an existing table to its previous stateD、 when a tablespace is dropped and you have only a user-managed full backup of the database

In which scenario will you perform a user-managed incomplete recovery?()A、 when a table is dropped and stored in the Recycle BinB、when a table is dropped and purged from the Recycle BinC、 when you are required to recover an existing table to its previous stateD、 when you are required to view all the versions of a row of an existing table between a specific time period

In which scenario will you perform an incomplete recovery?()A、 when a table is dropped and stored in the Recycle BinB、 when all the control files are deletedC、 when a member of a multiplexed redo log group is droppedD、 when you are required to recover a table to its previous state

多选题Which two steps are required for a Kompella Layer 2 VPN?()AConfigure a site ID for each CEBConfigure a VPN label for each VPNCConfigure a MP-BGP session to each PEDConfigure an Extended LDP Session to each PE

单选题In which scenario will you perform a cancel-based recovery?()A when a tablespace is dropped and you have only RMAN-based backup of the databaseB when a table is dropped and stored in the Recycle BinC when you are required to recover an existing table to its previous stateD when a tablespace is dropped and you have only a user-managed full backup of the database

单选题Which type of VPN router is not required to run MPLS?()AProvider Core (P)BProvider Edge (PE)CCustomer Edge (CE)DCustomer Boundary (CB)

单选题Regarding a route-based versus policy-based IPsec VPN, which statement is true?()AA route-based VPN generally uses less resources than a policy-based VPN.BA route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.CA route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.DA route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

单选题A policy-based IPsec VPN is ideal for which scenario?()Awhen you want to conserve tunnel resourcesBwhen the remote peer is a dialup or remote access clientCwhen you want to configure a tunnel policy with an action of denyDwhen a dynamic routing protocol such as OSPF must be sent across the VPN

单选题In which scenario will you perform a user-managed incomplete recovery?()A when a table is dropped and stored in the Recycle BinBwhen a table is dropped and purged from the Recycle BinC when you are required to recover an existing table to its previous stateD when you are required to view all the versions of a row of an existing table between a specific time period

单选题In JUNOS software, which type of encapsulation is required on a PE router for the CE-facinginterface in a Martini-based VPN?()AATMBCCCCHDLCDEthernet

单选题In which scenario will you perform an incomplete recovery?()A when a table is dropped and stored in the Recycle BinB when all the control files are deletedC when a member of a multiplexed redo log group is droppedD when you are required to recover a table to its previous state

单选题Routing convergence time is which of the following?()ATime required for a VPN connection to occurBTime required by protocols to update their forwarding tables after changes have occurredCTime required for an IDS to detect suspicious softwareDTime required by switch ports to update their link status and transition to the forwarding state

单选题In JUNOS software, which type of encapsulation is required on a PE router for the CE-facing interface in a Martini-based VPN?()AATMBCCCCHDLCDEthernet

单选题In JUNOS software, which type of VPN supports IPX and Appletalk?()AMartini based VPN’sB2547bis based VPN’sCSham link based VPN’sDVirtual Router based VPN’s

多选题Which two configuration elements are required for a policy-based VPN?()AIKE gatewayBsecure tunnel interfaceCsecurity policy to permit the IKE trafficDsecurity policy referencing the IPsec VPN tunnel

单选题When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? As a Network Engineer, it is necessary for you to know how to implement MPLS VPNs between Customer Edge and Provider Edge routers. Refer to the following descriptions, which one is making sense?()AIf using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistributionBIf using IS-IS as the PE-CE routing protocol, no redistribution is requiredCIf using static routes between the CE and PE routers, no redistribution of other VPN routes is requiredDIf PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required

多选题Which two configuration elements are required for a route-based VPN?()Asecure tunnel interfaceBsecurity policy to permit the IKE trafficCa route for the tunneled transit trafficDtunnel policy for transit traffic referencing the IPsec VPN