A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used
A route-based VPN is required for which scenario?()
- A、when the remote VPN peer is behind a NAT device
- B、when multiple networks need to be reached across the tunnel and GRE cannot be used
- C、when the remote VPN peer is a dialup or remote access client
- D、when a dynamic routing protocol is required across the VPN and GRE cannot be used
相关考题:
A route-based VPN is required for which scenario? () A. when the remote VPN peer is behind a NAT deviceB. when multiple networks need to be reached across the tunnelC. when the remote VPN peer is a dialup or remote access clientD. when a dynamic routing protocol such as OSPF is required across the VPN
What is the recommended practice when considering VPN termination and firewall placement?() A. have the firewall and VPN appliance deployed in parallelB. place the VPN in line with the firewall, with the VPN terminating inside the firewallC. place the public side of the VPN termination device in the DMZ behind a firewallD. place the VPN in line with the firewall, with the VPN terminating outside the firewall
There is MPLS VPN traffic traversing through a TE intermediate router. What is the MPLS packet labelstack sequence (from outer to inner) for the VPN traffic on this router?()A、TE label, IGP label, VPN labelB、IGP label, TE label, VPN labelC、TE label, VPN label, IGP labelD、VPN label, IGP label, TE labelE、IGP label, VPN label, TE label
In JUNOS software, which type of VPN supports IPX and Appletalk?()A、Martini based VPN’sB、2547bis based VPN’sC、Sham link based VPN’sD、Virtual Router based VPN’s
用户现在希望两个VPN的业务主机都能够访问internet,为了做到集中访问和集中控制,统一在核心节点A侧再增加一个VRF专门进行internet的访问。 已知VPN1的VRF的RT配置如下: ip vpn-instance vpn-1; vpn-target A export-extcommunity; vpn-target A import-extcommunity 已知VPN2的VRF的RT配置如下: ip vpn-instance vpn-2; vpn-target B export-extcommunity; vpn-target B import-extcommunity请写出super VPN的应该发布什么路由给其他两个VPN?
Which of the following topology situations would be a qood candidate for configuring DMVPN()A、Extranet VPNB、Managed overlay VPN topologyC、Hub-and-spoke VPN topologyD、Central-site VPN topologyE、Full mesh VPN topologyF、Remote-access VPN topology
What is the recommended practice when considering VPN termination and firewall placement?()A、 have the firewall and VPN appliance deployed in parallelB、 place the VPN in line with the firewall, with the VPN terminating inside the firewallC、 place the public side of the VPN termination device in the DMZ behind a firewallD、 place the VPN in line with the firewall, with the VPN terminating outside the firewall
Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A、A route-based VPN generally uses less resources than a policy-based VPN.B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN
Which two configuration elements are required for a route-based VPN?()A、secure tunnel interfaceB、security policy to permit the IKE trafficC、a route for the tunneled transit trafficD、tunnel policy for transit traffic referencing the IPsec VPN
单选题Regarding a route-based versus policy-based IPsec VPN, which statement is true?()AA route-based VPN generally uses less resources than a policy-based VPN.BA route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.CA route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.DA route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN
单选题A route-based VPN is required for which scenario? ()Awhen the remote VPN peer is behind a NAT deviceBwhen multiple networks need to be reached across the tunnelCwhen the remote VPN peer is a dialup or remote access clientDwhen a dynamic routing protocol such as OSPF is required across the VPN
单选题Which of the following topology situations would be a qood candidate for configuring DMVPN?()AExtranet VPNBManaged overlay VPN topologyCHub-and-spoke VPN topologyDCentral-site VPN topologyEFull mesh VPN topologyFRemote-access VPN topology
单选题What is the benefit of using the Cisco Easy VPN Server feature along with the Cisco software VPN client for implementing remote-access VPNs? ()A The Cisco Easy VPN Server feature and the Cisco software VPN client use the same GUI configuration tool to simplify remote-access VPN configurations.B The Cisco Easy VPN Server feature allows the Cisco software VPN client to receive its security policies from the central site VPN device. This minimizes the configuration requirements at the remote location for large remote access VPN deployments.C The Cisco Easy VPN Server feature and the Cisco software VPN client use hardware-based encryption to reduce the CPU overhead of the central site VPN router.D The Cisco Easy VPN Server feature and the Cisco software VPN client enable scalable remote-access VPNs deployment by using a thick client/thin server model where the central site VPN router can handle thousands of incoming VPN connections.
单选题In JUNOS software, which type of VPN supports IPX and Appletalk?()AMartini based VPN’sB2547bis based VPN’sCSham link based VPN’sDVirtual Router based VPN’s
单选题What is the recommended practice when considering VPN termination and firewall placement?()A have the firewall and VPN appliance deployed in parallelB place the VPN in line with the firewall, with the VPN terminating inside the firewallC place the public side of the VPN termination device in the DMZ behind a firewallD place the VPN in line with the firewall, with the VPN terminating outside the firewall
单选题You are designing a strategy for implementing Internet Authentication Service (IAS) to meet the business and technical requirements. What should you do?()AInstall IAS on VPN1, VPN2, and VPN3.BInstall IAS on VPN1, Configure VPN2 and VPN3 as RADIUS clients.CInstall IAS on VPN1, Configure VPN1, VPN2, and VPN3 as RADIUS clients.DInstall IAS on DC1, Configure VPN2 and VPN3 as RADIUS clients. Create all remote access policies on VPN1.EInstall IAS on DC2, Configure VPN2 and VPN3 as RADIUS clients. Configure remote access logging on VPN1.
多选题Which two configuration elements are required for a route-based VPN?()Asecure tunnel interfaceBsecurity policy to permit the IKE trafficCa route for the tunneled transit trafficDtunnel policy for transit traffic referencing the IPsec VPN