Which tunneling protocol can be described by these characteristics: 1) Handles multiple connections at the same time, 2) Provides secure authtentication and encryption, 3) Supports only IP networks, 4) Used to be focused mostly on LAN-to-LAN communication rather than dial-up protocol, 5) Works at the network layer and provides security on top of IP.以下选项中,那个隧道协议可以被描述为以下特点1.同一时间处理多个连接 2.提供安全认证和加密3.仅支持IP网络4.主要用于局域网到局域网的通信5.工作在网络层以及提供IP安全()A、Hybrid L2PPB、IPSecC、L2FD、L2TP

Which tunneling protocol can be described by these characteristics: 1) Handles multiple connections at the same time, 2) Provides secure authtentication and encryption, 3) Supports only IP networks, 4) Used to be focused mostly on LAN-to-LAN communication rather than dial-up protocol, 5) Works at the network layer and provides security on top of IP.以下选项中,那个隧道协议可以被描述为以下特点1.同一时间处理多个连接 2.提供安全认证和加密3.仅支持IP网络4.主要用于局域网到局域网的通信5.工作在网络层以及提供IP安全()

  • A、Hybrid L2PP
  • B、IPSec
  • C、L2F
  • D、L2TP

相关考题:

Which of the following are advantages of using Dynamic Host Configuration Protocol?() A. IP addresses can be managed from a central pointB. Computers can automatically get new addressing when moved to a different network segmentC. Media Access Control addresses can be changed automaticallyD. The network speed can automatically adjust based on the type of traffic being generatedE. The HOSTS file on the computer can be validated for proper entries

Which of the following provides Fibre Channel over IP and FCIP Tunneling Service for distance extension, which can enable cost-effective and manageable metro and global business continuity solutions?()A. IBM System Storage SAN80B-4B. IBM System Storage SAN Volume Controller (SVC)C. IBM System Storage SAN04B-R Multi-Protocol RouterD. IBM System Storage TS7650GProtecTIER Deduplication Gateway

Which of the following answers lists either a protocol or function that can be used by a host to dynamically learn its own IPv6 address?() A. Stateful DHCPB. Stateless DHCPC. Stateless autoconfigurationD. Neighbor Discovery Protocol

Which protocol can cause overload on a CPU of a managed device?() A. NetflowB. WCCPC. IP SLAD. SNMP

Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A、802.1XB、Cisco Temporal Key Integrity Protocol (CKIP)C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)D、Cisco Message Integrity Check (CMIC)E、One-Time Passwords (OTP)F、Advanced Encryption Standard (AES)

Which two of the following are designated fields for MAC tunneling protocol(802.1 ah)?()A、Service EthertypeB、ISLC、PseudoLAN TAGD、802.1q VLAN TAGE、Control WordF、Tunnel Label

Which parameter can be tuned to affect the selection of a static route as a backup.when a dynamic protocol is also being used?()A、link bandwidthB、hop countC、link costD、administrative distanceE、link delay

Which protocol can cause overload on a CPU of a managed device?()A、NetflowB、WCCPC、IP SLAD、SNMP

Which three of these statements about Dynamic Trunking Protocol are correct?()A、It supports autonegotiation for both ISL and IEEE 802.1Q trunks.B、It must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.C、It is a point-to-multipoint protocol.D、It is a point-to-point protocol.E、It is not supported on private VLAN ports or tunneling ports.

Which of the following answers lists either a protocol or function that can be used by a host to dynamically learn its own IPv6 address?()A、Stateful DHCPB、Stateless DHCPC、Stateless autoconfigurationD、Neighbor Discovery Protocol

n the case of Ethernet transport, which two types of attachment circuits does L2TPv3 support? ()A、port tunneling on the Ethernet subinterfaceB、VLAN tunneling on the Ethernet trunkC、port tunneling on the Ethernet interfaceD、VLAN tunneling on the Ethernet VLAN subinterfaceE、port tunneling on the Ethernet trunk

Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different…B、you can config one access list,per direction,per layer 3 protocolC、you can place as many access lists as you want on any interfaceD、you can apply ony one access list on any interface

Which of the following are advantages of using Dynamic Host Configuration Protocol?()A、IP addresses can be managed from a central pointB、Computers can automatically get new addressing when moved to a different network segmentC、Media Access Control addresses can be changed automaticallyD、The network speed can automatically adjust based on the type of traffic being generatedE、The HOSTS file on the computer can be validated for proper entries

Which of the following provides Fibre Channel over IP and FCIP Tunneling Service for distance extension, which can enable cost-effective and manageable metro and global business continuity solutions?()A、IBM System Storage SAN80B-4B、IBM System Storage SAN Volume Controller (SVC)C、IBM System Storage SAN04B-R Multi-Protocol RouterD、IBM System Storage TS7650GProtecTIER Deduplication Gateway

单选题Which parameter can be tuned to affect the selection of a static route as a backup.when a dynamic protocol is also being used?()Alink bandwidthBhop countClink costDadministrative distance

单选题Which statement is true concerning 6to4 tunneling?()AThe edge routers can use any locally configured IPv6 address.BHosts and routers inside a 6to4 site will need a special code.CAn edge router must use IPv6 address of 2002::/16 in its prefix.DIPv4 traffic is encapsulated with an IPv6 header.

多选题n the case of Ethernet transport, which two types of attachment circuits does L2TPv3 support? ()Aport tunneling on the Ethernet subinterfaceBVLAN tunneling on the Ethernet trunkCport tunneling on the Ethernet interfaceDVLAN tunneling on the Ethernet VLAN subinterfaceEport tunneling on the Ethernet trunk

单选题You need to recommend a VPN solution for the new sales office. The solution must support the  company's planned changs.   What should you include in the recommendation?()AInternet Key Exchange version 2 (IKEv2)BLayer 2 Tunneling Protocol (L2TP)CPoint-to-Point Tunneling Protocol (PPTP)DSecure Socket Tunneling Protocol (SSTP)

多选题Which two of the following are designated fields for MAC tunneling protocol(802.1 ah)?()AService EthertypeBISLCPseudoLAN TAGD802.1q VLAN TAGEControl WordFTunnel Label

单选题Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()Adual stackBdynamicCTeredoDManual 6to4

单选题Which statement about access lists that are applied to an interface is true?()Ayou can apply multiple access lists with the same protocol or in different…Byou can config one access list,per direction,per layer 3 protocolCyou can placeasmanyaccess lists as you want on any interfaceDyou can apply ony one access list on any interface

单选题Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()AGRE tunnelsBautomatic 6 to 4 tunnelsCISATAP tunnelsDmanual tunnels (RFC 2893)

多选题Which three of these statements about Dynamic Trunking Protocol are correct?()AIt supports autonegotiation for both ISL and IEEE 802.1Q trunks.BIt must be disabled on an interface if you do not want the interface to work as a trunk or start negotiation to become a trunk.CIt is a point-to-multipoint protocol.DIt is a point-to-point protocol.EIt is not supported on private VLAN ports or tunneling ports.

多选题Which are three advantages of PPPoA implementation? ()ANAP and NSP provide secure access to corporate gateways without managing end-to-end PVCs.NAP and NSP use Layer 3 routing,Layer 2 Forwarding,or Layer 2 Tunneling Protocol tunnels.Hence,they can scale their business models for selling wholesale serviceBThe NSP can oversubscribe by deploying idle and session timeouts using an industry standard RADIUS server for each subscriberCOnly a single session per CPE on one virtual channel (VC).The username and password are configured on the CPE, so all users behind the CPE for that particular VC can access only one set ofservices. Users cannot select different sets of services, although using multiple VCs and establishing different PPP session on different VCs is possibleDIf a single IP address is provided to the CPE, and NAT or PAT is implemented,certain applications such as IPTV,which embed IP information in the payload, well not work. Additionally,if an IP subnet feature is used,an IP address also has to be reserved for the CPEEPPPoA can use the features on the Cisco Service Selection Gateway (SSG)

单选题Which statement about access lists that are applied to an interface is true?()Ayou can apply multiple access lists with the same protocol or in different direction.Byou can config one access list,per direction,per layer 3 protocolCyou can place as many access lists as you want on any interfaceDyou can apply only one access list on any interface

多选题Which two mechanisms can be used to detect IPsec GRE tunnel failures?()ADead Peer Detection (DPD)BCDPCisakmp keepalivesDGRE keepalive mechanismEThe hello mechanism of the routing protocol across the IPsec tunnel

单选题Which parameter can be tuned to affect the selection of a static route as a backup.when a dynamic protocol is also being used?()Alink bandwidthBhop countClink costDadministrative distanceElink delay