单选题A route-based VPN is required for which scenario? ()Awhen the remote VPN peer is behind a NAT deviceBwhen multiple networks need to be reached across the tunnelCwhen the remote VPN peer is a dialup or remote access clientDwhen a dynamic routing protocol such as OSPF is required across the VPN

单选题
A route-based VPN is required for which scenario? ()
A

when the remote VPN peer is behind a NAT device

B

when multiple networks need to be reached across the tunnel

C

when the remote VPN peer is a dialup or remote access client

D

when a dynamic routing protocol such as OSPF is required across the VPN


参考解析

解析: 暂无解析

相关考题:

A route-based VPN is required for which scenario? () A. when the remote VPN peer is behind a NAT deviceB. when multiple networks need to be reached across the tunnelC. when the remote VPN peer is a dialup or remote access clientD. when a dynamic routing protocol such as OSPF is required across the VPN

Which VPN management feature would be considered to ensure that the network had the least disruption of service when making topology changes?() A. dynamic reconfigurationB. path MTU discoveryC. auto setupD. remote management

Which VPN management feature would be considered to ensure that the network had the leastdisruption of service when making topology changes?()A、 dynamic reconfigurationB、 path MTU discoveryC、 auto setupD、 remote management

When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

When using the Cisco SDM Quick Setup Siteto-Site VPN wizard, which three parameters do you configure?()A、Source interface where encrypted traffic originatesB、IP address for the remote peerC、Transform set for the IPsec tunnelD、Interface for the VPN connection

A route-based VPN is required for which scenario? ()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnelC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol such as OSPF is required across the VPN

You have a VPN server named Server1 and a file server named Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2). VPN clients report that they cannot access shares on Server2 after connecting to Server1. You confirm that VPN clients receive the appropriate IP configurations and that they have permissions to the shared folders on Server2. You need to ensure that VPN clients can access the shares on Server2 when they connect to the network by using a VPN connection.  What should you do? ()A、From the Routing and Remote Access snap-in on Server2, enable IP Routing.B、From the Routing and Remote Access snap-in on Server2, enable Link Control Protocol (LCP) extensions.C、From Utility Manager on Server1, enable the Start automatically when I log on option.D、In the local security policy on Server2, configure the Network Access: Shares that can be accessed anonymously setting.

A policy-based IPsec VPN is ideal for which scenario?()A、when you want to conserve tunnel resourcesB、when the remote peer is a dialup or remote access clientC、when you want to configure a tunnel policy with an action of denyD、when a dynamic routing protocol such as OSPF must be sent across the VPN

Which VPN management feature would be considered to ensure that the network had the least disruption of service when making topology changes?()A、dynamic reconfigurationB、path MTU discoveryC、auto setupD、remote management

When configuring a Cisco Adaptive Security Appliance in multiple context mode, which of the follow capabilities are supported?()A、 Multicastis supportedB、 Dynamic routing protocols are supportedC、 VPN configurations are supportedD、 Static routes are supported

Why is NTP an important component when implementing IPSec VPN in a PKI environment?()A、 To ensure the router has the correct time when generating its private/public key pairs.B、 To ensure the router has the correct time when checking certificate validity from the remote peersC、 To ensure the router time is sync with the remote peers for encryption keys generationD、 To ensure the router time is sync with the remote peers during theDH exchangeE、 To ensure the router time is sync with the remote peers when generating the cookies during IKE phase 1

An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()A、The MAC can only be delivered to a mobile phone and is good for a single use only.B、The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.C、The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.D、The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.

Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A、A route-based VPN generally uses less resources than a policy-based VPN.B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used

You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

单选题An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()AThe MAC can only be delivered to a mobile phone and is good for a single use only.BThe MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.CThe MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.DThe MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.

单选题You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A Configure each server running Routing and Remote Access as a RADIUS Client.B Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

单选题A policy-based IPsec VPN is ideal for which scenario?()Awhen you want to conserve tunnel resourcesBwhen the remote peer is a dialup or remote access clientCwhen you want to configure a tunnel policy with an action of denyDwhen a dynamic routing protocol such as OSPF must be sent across the VPN

单选题A route-based VPN is required for which scenario? ()Awhen the remote VPN peer is behind a NAT deviceBwhen multiple networks need to be reached across the tunnelCwhen the remote VPN peer is a dialup or remote access clientDwhen a dynamic routing protocol such as OSPF is required across the VPN

单选题Why is NTP an important component when implementing IPSec VPN in a PKI environment?()A To ensure the router has the correct time when generating its private/public key pairs.B To ensure the router has the correct time when checking certificate validity from the remote peersC To ensure the router time is sync with the remote peers for encryption keys generationD To ensure the router time is sync with the remote peers during theDH exchangeE To ensure the router time is sync with the remote peers when generating the cookies during IKE phase 1

单选题Which VPN management feature would be considered to ensure that the network had the least disruption of service when making topology changes?()A dynamic reconfigurationB path MTU discoveryC auto setupD remote management

单选题Regarding a route-based versus policy-based IPsec VPN, which statement is true?()AA route-based VPN generally uses less resources than a policy-based VPN.BA route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.CA route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.DA route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

单选题A route-based VPN is required for which scenario?()Awhen the remote VPN peer is behind a NAT deviceBwhen multiple networks need to be reached across the tunnel and GRE cannot be usedCwhen the remote VPN peer is a dialup or remote access clientDwhen a dynamic routing protocol is required across the VPN and GRE cannot be used

单选题Which VPN management feature would be considered to ensure that the network had the leastdisruption of service when making topology changes?()A dynamic reconfigurationB path MTU discoveryC auto setupD remote management

单选题You have a VPN server named Server1 and a file server named Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2). VPN clients report that they cannot access shares on Server2 after connecting to Server1. You confirm that VPN clients receive the appropriate IP configurations and that they have permissions to the shared folders on Server2. You need to ensure that VPN clients can access the shares on Server2 when they connect to the network by using a VPN connection.  What should you do? ()AFrom the Routing and Remote Access snap-in on Server2, enable IP Routing.BFrom the Routing and Remote Access snap-in on Server2, enable Link Control Protocol (LCP) extensions.CFrom Utility Manager on Server1, enable the Start automatically when I log on option.DIn the local security policy on Server2, configure the Network Access: Shares that can be accessed anonymously setting.

单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A It is recommended to place the VPN termination device in line with the Enterprise Edge 1B Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

单选题You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()AConfigure each server running Routing and Remote Access as a RADIUS Client.  BAdd a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.  CAdd a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.  DAdd a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

单选题When configuring a Cisco Adaptive Security Appliance in multiple context mode, which of the follow capabilities are supported?()A Multicastis supportedB Dynamic routing protocols are supportedC VPN configurations are supportedD Static routes are supported