What is the recommended practice when considering VPN termination and firewall placement?()A、 have the firewall and VPN appliance deployed in parallelB、 place the VPN in line with the firewall, with the VPN terminating inside the firewallC、 place the public side of the VPN termination device in the DMZ behind a firewallD、 place the VPN in line with the firewall, with the VPN terminating outside the firewall
What is the recommended practice when considering VPN termination and firewall placement?()
- A、 have the firewall and VPN appliance deployed in parallel
- B、 place the VPN in line with the firewall, with the VPN terminating inside the firewall
- C、 place the public side of the VPN termination device in the DMZ behind a firewall
- D、 place the VPN in line with the firewall, with the VPN terminating outside the firewall
相关考题:
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A. inline with a firewallB. in a DMZ outside the firewallC. parallel with a firewallD. in a DMZ behind the firewall
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?() A. RADIUS or LDAPB. an internal router running EIGRPC. Reverse Route Injection and OSPF or RIPv2D. the VPN appliance to be deployed in line with the firewall
What is the recommended practice when considering VPN termination and firewall placement?() A. have the firewall and VPN appliance deployed in parallelB. place the VPN in line with the firewall, with the VPN terminating inside the firewallC. place the public side of the VPN termination device in the DMZ behind a firewallD. place the VPN in line with the firewall, with the VPN terminating outside the firewall
Refer to the exhibit. When deploying an MSFC and an FWSM, which statement is correct?() A. Proper placement depends on the VLAN assignment.B. Place it outside the firewall.C. Place it inside the firewall to make design and management easier.D. Place it inside the firewall with multiple context modes connecting to all configured contexts.
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A、 RADIUS or LDAPB、 an internal router running EIGRPC、 Reverse Route Injection and OSPF or RIPv2D、 the VPN appliance to be deployed in line with the firewall
When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()A、fewer devices to manageB、moderate-to-high scalabilityC、stateful inspection of decrypted VPN trafficD、increased bandwidth with additional interfacesE、decreased complexity as traffic is filtered from the firewall
As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A、 inline with a firewallB、 in a DMZ outside the firewallC、 parallel with a firewallD、 in a DMZ behind the firewall
Which of the following devices can be installed on individual computers throughout the network?()A、NIPSB、Network-based firewallC、VPN concentratorD、Host-based firewall
Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: °Error 721: The remote computer is not responding.You need to ensure that users can establish a VPN connection. What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.
You deploy a Windows Server 2008 R2 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows 7.The firewall is configured to allow only secured Web communications.You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall.What should you do?()A、Create an IPsec tunnel.B、Create an SSTP VPN connection.C、Create a PPTP VPN connection.D、Create an L2TP VPN connection.
You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server supports only PPTP connections. A firewall protects the VPN server from the Internet. From a remote computer connected to the Internet, you attempt to connect to the VPN server. During the connection attempt, you receive a message that your user name and password are being verified. You then receive the following error message: “Error 721: The remote computer is not responding.”You need to ensure that you can establish a VPN connection to the VPN server from the Internet. What should you do?()A、On the VPN server, enable LAN routing.B、On the VPN server, create a demand-dial interface.C、On the firewall, allow inbound connections that use TCP port 1701.D、On the firewall, allow inbound connections that use Generic Route Encapsulation (GRE) protocol 47.
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ( )? A、Create an IPsec tunnelB、Create an SSTP VPN connectionC、Create a PPTP VPN connectionD、Create an L2TP VPN connection
You deploy a Windows Server 2008 R2 VPN server behind a firewall. Remote users connect to theVPN by using portable computers that run Windows 7. The firewall is configured to allow only secured Web communications.You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall. What should you do?()A、Create an IPsec tunnel.B、Create an SSTP VPN connection.C、Create a PPTP VPN connection.D、Create an L2TP VPN connection.
单选题What is the recommended practice when considering VPN termination and firewall placement?()Ahave the firewall and VPN appliance deployed in parallelBplace the VPN in line with the firewall, with the VPN terminating inside the firewallCplace the public side of the VPN termination device in the DMZ behind a firewallDplace the VPN in line with the firewall, with the VPN terminating outside the firewall
多选题Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()Aonboard VPN acceleratorBevents correlation and proactive responseChigh-performance AIM VPN modulesDvirtual firewallECisco lOS Firewall and lOS IPSFtransparent firewall
单选题What is the recommended practice when considering VPN termination and firewall placement?()A have the firewall and VPN appliance deployed in parallelB place the VPN in line with the firewall, with the VPN terminating inside the firewallC place the public side of the VPN termination device in the DMZ behind a firewallD place the VPN in line with the firewall, with the VPN terminating outside the firewall
单选题As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A inline with a firewallB in a DMZ outside the firewallC parallel with a firewallD in a DMZ behind the firewall
单选题What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()ARADIUS or LDAPBan internal router running EIGRPCReverse Route Injection and OSPF or RIPv2Dthe VPN appliance to be deployed in line with the firewall
单选题You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()A Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B Allow all inbound VPN traffic to pass through the perimeter firewall only.C Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
单选题As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()Ainline with a firewallBin a DMZ outside the firewallCparallel with a firewallDin a DMZ behind the firewall
单选题You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server supports only PPTP connections. A firewall protects the VPN server from the Internet. From a remote computer connected to the Internet, you attempt to connect to the VPN server. During the connection attempt, you receive a message that your user name and password are being verified. You then receive the following error message: “Error 721: The remote computer is not responding.”You need to ensure that you can establish a VPN connection to the VPN server from the Internet. What should you do?()AOn the VPN server, enable LAN routing.BOn the VPN server, create a demand-dial interface.COn the firewall, allow inbound connections that use TCP port 1701.DOn the firewall, allow inbound connections that use Generic Route Encapsulation (GRE) protocol 47.
单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A It is recommended to place the VPN termination device in line with the Enterprise Edge 1B Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
多选题Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()Afewer devices to manageBmoderate-to-high scalabilityCstateful inspection of decrypted VPN trafficDincreased bandwidth with additional interfacesEdecreased complexity as traffic is filtered from the firewall