多选题When comparing CPE and provider-provisioned VPNs (PPVPN), which two statements are true?()ACPE VPN’s require dedicated VPN aware hardware at customer site, PPVPN does not.BPPVPN’s require dedicated VPN aware hardware at customer site, CPE VPN’s does not.CCPE VPN’s scale better than PPVPN’s as they do not require a per site configuration on the CPEDPPVPN’s scale better than CPE VPN’s as they do not require a per site configuration on the CPE

多选题
When comparing CPE and provider-provisioned VPNs (PPVPN), which two statements are true?()
A

CPE VPN’s require dedicated VPN aware hardware at customer site, PPVPN does not.

B

PPVPN’s require dedicated VPN aware hardware at customer site, CPE VPN’s does not.

C

CPE VPN’s scale better than PPVPN’s as they do not require a per site configuration on the CPE

D

PPVPN’s scale better than CPE VPN’s as they do not require a per site configuration on the CPE


参考解析

解析: 暂无解析

相关考题:

Which statement is true regarding IPsec VPNs?() A. There are five phases of IKE negotiation.B. There are two phases of IKE negotiation.C. IPsec VPN tunnels are not supported on SRX Series devices.D. IPsec VPNs require a tunnel PIC in SRX Series devices.

Which VPN router does not contain customer routing knowledge?() A. Provider Core (P)B. Provider Edge (PE)C. Customer Edge (CE)D. Customer Boundary (CB)

When implementing MPLS VPNs between CE and PE routers, which of these statements is correct?As a Network Engineer, it is necessary for you to know how to implement MPLS VPNs between Customer Edge and Provider Edge routers.Refer to the following descriptions, which one is making sense?()A. If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistributionB. If using IS-IS as the PE-CE routing protocol, no redistribution is requiredC. If using static routes between the CE and PE routers, no redistribution of other VPN routes is requiredD. If PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required

What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?() A. RADIUS or LDAPB. an internal router running EIGRPC. Reverse Route Injection and OSPF or RIPv2D. the VPN appliance to be deployed in line with the firewall

Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A. Easy VPNB. GRE tunnelingC. Virtual Tunnel InterfacesD. DynamicMultipoint VPNE. Group Encrypted Transport VPN

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?() A.Cisco IOS IPsec/SSL VPN clientB.Cisco VPN ClinetC.ISDN terminal adapterD.Cisco Adaptive Security Appliance

What is the benefit of using the Cisco Easy VPN Server feature along with the Cisco software VPN client for implementing remote-access VPNs? ()A、 The Cisco Easy VPN Server feature and the Cisco software VPN client use the same GUI configuration tool to simplify remote-access VPN configurations.B、 The Cisco Easy VPN Server feature allows the Cisco software VPN client to receive its security policies from the central site VPN device. This minimizes the configuration requirements at the remote location for large remote access VPN deployments.C、 The Cisco Easy VPN Server feature and the Cisco software VPN client use hardware-based encryption to reduce the CPU overhead of the central site VPN router.D、 The Cisco Easy VPN Server feature and the Cisco software VPN client enable scalable remote-access VPNs deployment by using a thick client/thin server model where the central site VPN router can handle thousands of incoming VPN connections.

Which of the following are common issues that should be considered when establishing ortroubleshooting site-to-site VPNs?(Choose all that apply.)()A、User authenticationB、Overlapping IP address spaceC、GRE or IPsec configurationD、MTU sizeE、VPN client softwareF、Authentication server configured ly

What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A、 RADIUS or LDAPB、 an internal router running EIGRPC、 Reverse Route Injection and OSPF or RIPv2D、 the VPN appliance to be deployed in line with the firewall

Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、DynamicMultipoint VPNE、Group Encrypted Transport VPN

When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? As a Network Engineer, it is necessary for you to know how to implement MPLS VPNs between Customer Edge and Provider Edge routers. Refer to the following descriptions, which one is making sense?()A、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistributionB、If using IS-IS as the PE-CE routing protocol, no redistribution is requiredC、If using static routes between the CE and PE routers, no redistribution of other VPN routes is requiredD、If PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required

Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、Dynamic Multipoint VPNE、Group Encrypted Transport VPN

Which VPN router does not contain customer routing knowledge?()A、Provider Core (P)B、Provider Edge (PE)C、Customer Edge (CE)D、Customer Boundary (CB)

In JUNOS software, which type of VPN supports IPX and Appletalk?()A、Martini based VPN’sB、2547bis based VPN’sC、Sham link based VPN’sD、Virtual Router based VPN’s

You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()A、 Easy VPNB、 IPsec GRE tunnelingC、 Virtual Tunnel InterfacesD、 Dynamic Multipoint VPN

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()A、Cisco IOS IPsec/SSL VPN clientB、Cisco VPN ClinetC、ISDN terminal adapterD、Cisco Adaptive Security Appliance

Which of the following topology situations would be a qood candidate for configuring DMVPN()A、Extranet VPNB、Managed overlay VPN topologyC、Hub-and-spoke VPN topologyD、Central-site VPN topologyE、Full mesh VPN topologyF、Remote-access VPN topology

When comparing CPE and provider-provisioned VPNs (PPVPN), which two statements are true?()A、CPE VPN’s require dedicated VPN aware hardware at customer site, PPVPN does not.B、PPVPN’s require dedicated VPN aware hardware at customer site, CPE VPN’s does not.C、CPE VPN’s scale better than PPVPN’s as they do not require a per site configuration on the CPED、PPVPN’s scale better than CPE VPN’s as they do not require a per site configuration on the CPE

Which statement is true regarding IPsec VPNs?()A、There are five phases of IKE negotiation.B、There are two phases of IKE negotiation.C、IPsec VPN tunnels are not supported on SRX Series devices.D、IPsec VPNs require a tunnel PIC in SRX Series devices.

单选题Which VPN router does not contain customer routing knowledge?()AProvider Core (P)BProvider Edge (PE)CCustomer Edge (CE)DCustomer Boundary (CB)

单选题Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients toact as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A Easy VPNB GRE tunnelingC Virtual Tunnel InterfacesD Dynamic Multipoint VPNE Group Encrypted Transport VPN

单选题Which of the following topology situations would be a qood candidate for configuring DMVPN?()AExtranet VPNBManaged overlay VPN topologyCHub-and-spoke VPN topologyDCentral-site VPN topologyEFull mesh VPN topologyFRemote-access VPN topology

单选题You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()A Easy VPNB IPsec GRE tunnelingC Virtual Tunnel InterfacesD Dynamic Multipoint VPN

单选题What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()ARADIUS or LDAPBan internal router running EIGRPCReverse Route Injection and OSPF or RIPv2Dthe VPN appliance to be deployed in line with the firewall

单选题Which statement is true regarding IPsec VPNs?()AThere are five phases of IKE negotiation.BThere are two phases of IKE negotiation.CIPsec VPN tunnels are not supported on SRX Series devices.DIPsec VPNs require a tunnel PIC in SRX Series devices.

多选题When comparing CPE and provider-provisioned VPNs (PPVPN), which two statements are true?()ACPE VPN’s require dedicated VPN aware hardware at customer site, PPVPN does not.BPPVPN’s require dedicated VPN aware hardware at customer site, CPE VPN’s does not.CCPE VPN’s scale better than PPVPN’s as they do not require a per site configuration on the CPEDPPVPN’s scale better than CPE VPN’s as they do not require a per site configuration on the CPE

多选题You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()AUse a password generator application to create a preshared key, and distribute it to all mobile usersBUse computer autoenrollment to create digital certificates that can be used to authenticate to a VPN serverCAcquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connectionDConfigure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates

多选题Which two steps are required for a Kompella Layer 2 VPN?()AConfigure a site ID for each CEBConfigure a VPN label for each VPNCConfigure a MP-BGP session to each PEDConfigure an Extended LDP Session to each PE