多选题Users of a site-to-site VPN are reporting performance problems. The VPN connection employsIPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem?()AEmploy path MTU discovery.BSet the MTU higher than 1500 bytes.CTurn off pre-fragmentation for IPSec.DSet the MTU value to 1400 bytes.

多选题
Users of a site-to-site VPN are reporting performance problems. The VPN connection employsIPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem?()
A

Employ path MTU discovery.

B

Set the MTU higher than 1500 bytes.

C

Turn off pre-fragmentation for IPSec.

D

Set the MTU value to 1400 bytes.


参考解析

解析: 暂无解析

相关考题:

● Scope reporting is the timely determination, _____, and _____ of project progress, status data, and transforming this into structured documentation (reports) necessary to judge project performance (reporting on work packages).A Recording, accumulation.B Recording, graphical display.C Accumulation, graphical display.D Graphical display, interpretation.E Interpretation, analysis.

Overall objective of financial reporting is to provide financial information useful to internal users in making economic decisions.()

You are an experienced network administrator in an international corporation. During your working hours, you are asked to deploy the Cisco SSL VPN AIM module in a Cisco 1800 Series Router. The beneficial reason for that deployment is to:()A. improve performance up to 300% for both IPsec and SSL VPN applicationsB. improve performance for both IPsec and SSL VPN applications with IPsec encryption taking place in hardwareC. improve performance up to 300% for both IPsec and SSL VPN applications with SSL encryption taking place in hardwareD. improve performance up to 200% for both IPsec and SSL VPN applications with encryption taking place in hardwareE. improve performance exclusively for SSL VPN applications

Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A. Easy VPNB. GRE tunnelingC. Virtual Tunnel InterfacesD. DynamicMultipoint VPNE. Group Encrypted Transport VPN

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?() A.Cisco IOS IPsec/SSL VPN clientB.Cisco VPN ClinetC.ISDN terminal adapterD.Cisco Adaptive Security Appliance

A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted

Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、DynamicMultipoint VPNE、Group Encrypted Transport VPN

Cisco Configuration Assistant supports a variety of virtual private networks. Which three types of VPN can be configured by using CCA?()A、 DMVPNB、 MPLS VPNC、 IPv6 VPND、 Cisco IOS SSL VPNE、 site-to-site VPNF、 Cisco Easy VPN

Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、Dynamic Multipoint VPNE、Group Encrypted Transport VPN

Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()A、Cisco IOS IPsec/SSL VPN clientB、Cisco VPN ClinetC、ISDN terminal adapterD、Cisco Adaptive Security Appliance

You are an experienced network administrator in an international corporation. During your working hours, you are asked to deploy the Cisco SSL VPN AIM module in a Cisco 1800 Series Router. The beneficial reason for that deployment is to:()A、improve performance up to 300% for both IPsec and SSL VPN applicationsB、improve performance for both IPsec and SSL VPN applications with IPsec encryption taking place in hardwareC、improve performance up to 300% for both IPsec and SSL VPN applications with SSL encryption taking place in hardwareD、improve performance up to 200% for both IPsec and SSL VPN applications with encryption taking place in hardwareE、improve performance exclusively for SSL VPN applications

When is the site-to-site remote access model appropriate? ()A、for multiple ISDN connectionsB、for modem concentrated dial-up connectionsC、for a group of users in the same vicinity sharing a connectionD、for use by mobile users

You are considering deploying the Cisco SSL VPN AIM module in a Cisco 1800 Series Router.Which benefit should you expect?()A、to improve performance exclusively for SSL VPN applicationsB、to improve performance up to 300% for both IPsec and SSL VPN applicationsC、to improve performance for both IPsec and SSL VPN applications with IPsec encryption taking place in hardwareD、to improve performance up to 200% for both IPsec and SSL VPN applications with encryption taking place in hardwareE、to improve performance up to 300% for both IPsec and SSL VPN applications with SSL encryption taking place in hardware

Which security-enabled device is recommended to provide a site-to-site IPsec VPN solution, but not SSL?()A、 Cisco Integrated Service RoutersB、 Cisco ASA 5500 Series Security ApplianceC、 CiscoWebVPN Services ModuleD、 CiscoIPsec VPN Module

Which of the following are troubleshooting targets common to both site-to-site and remote-accessVPNs?(Choose all that apply.)()A、Routing loopsB、Misconfiguration of VPN end pointsC、Overiapping IP address spaceD、DMVPNE、User profilesF、MTU

What are two common reporting requirements?()A、the database connectivity methodB、the number of users in the solutionC、the number of reports being installed D、ability to send completed reports by e-mailE、reporting output available in Microsoft Excel

Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00.  What should you do( )?  A、Create a network policy for VPN connections. modify the Day and time restrictions.B、Create a network policy for VPN connections. apply an ip filter to deny access to the corporate network.C、Modify the Logon hours for all users objects to specify only the VPN server otn he computer restrictions optionD、Modify the Logon hours for the default domain policy to enable the Force logoff when logon hours expire option.

单选题Which security-enabled device is recommended to provide a site-to-site IPsec VPN solution, but not SSL?()A Cisco Integrated Service RoutersB Cisco ASA 5500 Series Security ApplianceC CiscoWebVPN Services ModuleD CiscoIPsec VPN Module

多选题Users of a site-to-site VPN are reporting performance problems. The VPN connection employs IPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem?()AEmploy path MTU discovery.BSet the MTU higher than 1500 bytes.CTurn off pre-fragmentation for IPSec.DSet the MTU value to 1400 bytes.

单选题When is the site-to-site remote access model appropriate? ()Afor multiple ISDN connectionsBfor modem concentrated dial-up connectionsCfor a group of users in the same vicinity sharing a connectionDfor use by mobile users

单选题When is the site-to-site remote access model appropriate? ()A for multiple ISDN connectionsB for modem concentrated dial-up connectionsC for a group of users in the same vicinity sharing a connectionD for use by mobile users

多选题Which of the following are troubleshooting targets common to both site-to-site and remote-accessVPNs?(Choose all that apply.)()ARouting loopsBMisconfiguration of VPN end pointsCOveriapping IP address spaceDDMVPNEUser profilesFMTU

单选题You are considering deploying the Cisco SSL VPN AIM module in a Cisco 1800 Series Router.Which benefit should you expect?()Ato improve performance exclusively for SSL VPN applicationsBto improve performance up to 300% for both IPsec and SSL VPN applicationsCto improve performance for both IPsec and SSL VPN applications with IPsec encryption taking place in hardwareDto improve performance up to 200% for both IPsec and SSL VPN applications with encryption taking place in hardwareEto improve performance up to 300% for both IPsec and SSL VPN applications with SSL encryption taking place in hardware

单选题You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall.  What should you do ( )?ACreate an IPsec tunnelBCreate an SSTP VPN connectionCCreate a PPTP VPN connectionDCreate an L2TP VPN connection

单选题Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients toact as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A Easy VPNB GRE tunnelingC Virtual Tunnel InterfacesD Dynamic Multipoint VPNE Group Encrypted Transport VPN

多选题What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()Aall traffic is encrypted using IPSec and the Triple-DES algorithmBfull support for all Enterprise applications, including data, voice, and videoCthousands of Teleworker VPN tunnels can be aggregated to a headquarters locationDthe VPN tunnel is an always on site-to-site VPN connectionEportability for use while travelingFused with broadband Cable/DSL subscriptions