单选题You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()A Easy VPNB IPsec GRE tunnelingC Virtual Tunnel InterfacesD Dynamic Multipoint VPN

单选题
You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()
A

 Easy VPN

B

 IPsec GRE tunneling

C

 Virtual Tunnel Interfaces

D

 Dynamic Multipoint VPN


参考解析

解析: 暂无解析

相关考题:

You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A. then rejectB. then discardC. then next filterD. then silent-drop

You can successfully ping a Bridged 1483 customer‘s workstation from the local ERX. However, a remote ERX router in your network cannot ping that same device.What could be causing this problem?() A. incorrect DSL network redistributionB. incorrect static host route configurationC. incorrect static customer route configurationD. incorrect default static route configuration on the end user

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A. from source-portB. from source-addressC. from destination-addressD. from destination-port

You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts.Which network mask should you use?()A.255.255.255.192B.255.255.255.224C.255.255.255.240D.255.255.255.248E.255.255.255.252F.255.255.255.254

You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()A.full meshB.peer-to-peerC.partial meshD.hub and spoke

You are the network consultant from Cisco.com. Please point out the reason that STP required when VLANs do not span access layer switches.() A. ensure a loop-free topologyB. protect against user-side loopsC. support business applicationsD. risk of lost connectivity without STP

You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?() A. Flex LinksB. loop-free UC. looped squareD. looped triangle

You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()A、EncryptionB、Bandwidth limitsC、Minimal signal lossD、No EMI

You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts. Which network mask should you use?()A、255.255.255.192B、255.255.255.224C、255.255.255.240D、255.255.255.248E、255.255.255.252F、255.255.255.254

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A、from source-portB、from source-addressC、from destination-addressD、from destination-port

You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()A、 Easy VPNB、 IPsec GRE tunnelingC、 Virtual Tunnel InterfacesD、 Dynamic Multipoint VPN

You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A、Content storage networkingB、Network optimizationC、Network managementD、Network security

You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()A、Protecting the business from information outagesB、Optimizing the efficiency with which IT operatesC、An increased need for specialized IT silosD、IT systems grow fast

You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing

You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()A、ExecutableB、TrojanC、VirusD、Worm

You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?()A、Flex LinksB、loop-free UC、looped squareD、looped triangle

You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A、then rejectB、then discardC、then next filterD、then silent-drop

You need to create a VPN connection. What should you do?()A、From Windows Explorer, right-click Computer and then click Map network drive.B、From Windows Explorer, right-click Computer and then click Add a network location.C、From Network and Sharing Center, click Set up a new connection or network and then click Set up anew network.D、From Network and Sharing Center, click Set up a new connection or network and then click Connect to aworkplace.

Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()A、From Credential Manager, modify the generic credentials.B、From Credential Manager, modify the Windows credentials.C、From Network and Sharing Center, turn on Network discovery.D、From Network and Sharing Center, modify the wireless network connection settings.

单选题You are the network consultant from Cisco.com. Please point out the reason that STP required when VLANs do not span access layer switches.()Aensure a loop-free topologyBprotect against user-side loopsCsupport business applicationsDrisk of lost connectivity without STP

多选题You are the network consultant from passguide.com. You should tell your clients Two technologies help them save much time from complex computing. ()AVPNBInfiniBandCSCSI over IPDRemote Direct Memory Access

单选题You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()ANetwork managementBNetwork optimizationCNetwork securityDContent storage networking

单选题You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()ASource TCP portBSource IP addressCDestination TCP portDDestination IP address

单选题You can successfully ping a Bridged 1483 customer's workstation from the local ERX. However, a remote ERX router in your network cannot ping that same device. What could be causing this problem?()Aincorrect DSL network redistributionBincorrect static host route configurationCincorrect static customer route configurationDincorrect default static route configuration on the end user

单选题You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()Afull meshBpeer-to-peerCpartial meshDhub and spoke

多选题You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()AEncryptionBBandwidth limitsCMinimal signal lossDNo EMI

多选题You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()AAn increased need for specialized IT silosBProtecting the business from information outagesCIT systems grow fastDOptimizing the efficiency with which IT operates