When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()

  • A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1
  • B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment
  • C、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place
  • D、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

相关考题:

Which of the following is the FIRST thing to consider when designing an email retention policy?() A. Local laws and industry regulationsB. Company policies and guidelinesC. Project guidelines given by stakeholdersD. Mail server and backup capacity

When designing a PC, which of the following components would help a large application load theFASTEST?() A. Solid state driveB. 1 MB L2 cache memoryC. High-end graphics cardD. Dual core CPU

Software Engineering is best described as ( ).A.the practice of designing, building, and maintaining off-the-shelf software from prefabricated partsB.the practice of designing, building, and maintaining ad-hoc software without the use of formal methodsC.the practice of designing, building, and maintaining reliable and cost-effective software using standard techniquesD.the practice of designing, building, and maintaining fast and flexible software specifically for engineering applications

You are the Cisco Network Designer in Cisco.com. Which of these practices should you follow when designing a Layer 3 routing protocol?() A. Never peer on transit links.B. Build squares for deterministic convergence.C. Build inverted U designs for deterministic convergence.D. Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.

When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? () A. rate limit voice trafficB. configure spanning-tree for fast link convergenceC. isolate voice traffic on separate VLANsD. classify and mark traffic close to the source

When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?() A.RFPB.RFCC.SLC/SLAD.SOW

Software Engineering is best described as ( ). A. the practice of designing, building, and maintaining off-the-shelf software from prefabricated parts B. the practice of designing, building, and maintaining ad-hoc software without the use of formal methods C. the practice of designing, building, and maintaining reliable and cost-effective software using standard techniques D. the practice of designing, building, and maintaining fast and flexible software specifically for engineering applications

When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates

When designing the routing for an Enterprise Campus network it is important to keep while of thefollowing filtering aspects in mind?()A、 Filtering is only useful when combined with route summarizationB、 It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networksC、 IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updatesD、 The primary limitation of router filtering is that it can only be applied on outbound updates

When designing a PC, which of the following components would help a large application load theFASTEST?()A、Solid state driveB、1 MB L2 cache memoryC、High-end graphics cardD、Dual core CPU

When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()A、RFPB、RFCC、SLC/SLAD、SOW

When designing a converged network, which measures can be taken at the building access layerto help eliminate latency and ensure end-to-end quality of service can be maintained?()A、 rate limit voice trafficB、 configure spanning-tree for fast link convergenceC、 isolate voice traffic on separate VLANsD、 classify and mark traffic close to the source

Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization

Which of the following is the FIRST thing to consider when designing an email retention policy?()A、 Local laws and industry regulationsB、 Company policies and guidelinesC、 Project guidelines given by stakeholdersD、 Mail server and backup capacity

When designing an expansion within the same data center, when is a pre-sales TDA absolutely required by IBM?()A、for a SAN768B DirectorB、for a second TS3500 Tape LibraryC、for a second EXP5060 Expansion UnitD、for an additional DS8300 Expansion Frame

You are designing an application that will use Windows Azure Table storage to store millions of data points each day.  The application must retain each day’s data for only one week.   You need to recommend an approach for minimizing storage transactions.  What should you recommend?()A、 Use a separate table for each date.  Delete eachtable when it is one week old.B、 Use a separate table for each week.  Delete each table when it is one week old.C、 Use a single table, partitioned by date.  Use Entity Group Transactions to delete data when it is one week old.D、 Use a single table, partitioned by week.  Use Entity Group Transactions to delete data when it is one week old.

单选题When designing speaking tasks, we must follow the principles except.Amaximum foreign talkBeven participationChigh motivationDhigh language level

单选题When designing an expansion within the same data center, when is a pre-sales TDA absolutely required by IBM?()Afor a SAN768B DirectorBfor a second TS3500 Tape LibraryCfor a second EXP5060 Expansion UnitDfor an additional DS8300 Expansion Frame

单选题When designing speaking tasks,we must follow the principles except ____.Amaximum foreign talkBeven participationChigh motivationDhigh language level

单选题When designing a PC, which of the following components would help a large application load theFASTEST?()ASolid state driveB1 MB L2 cache memoryCHigh-end graphics cardDDual core CPU

单选题You are designing an application that will use Windows Azure Table storage to store millions of data points each day.  The application must retain each day’s data for only one week.   You need to recommend an approach for minimizing storage transactions.  What should you recommend?()A Use a separate table for each date.  Delete eachtable when it is one week old.B Use a separate table for each week.  Delete each table when it is one week old.C Use a single table, partitioned by date.  Use Entity Group Transactions to delete data when it is one week old.D Use a single table, partitioned by week.  Use Entity Group Transactions to delete data when it is one week old.

单选题You are the Cisco Network Designer in Cisco.com. Which of these practices should you follow when designing a Layer 3 routing protocol?()ANever peer on transit links.BBuild squares for deterministic convergence.CBuild inverted U designs for deterministic convergence.DSummarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.

单选题When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()A RFPB RFCC SLC/SLAD SOW

单选题Which technology is an example of the need for a designer to clearly define features and designedperformance when designing advanced WAN services with a service provider?()A FHRP to remote branches.B Layer 3 MPLS VPNs routing.C Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.D Intrusion prevention, QoS, and stateful firewall support network wide.

单选题When designing the routing for an Enterprise Campus network it is important to keep while of thefollowing filtering aspects in mind?()A Filtering is only useful when combined with route summarizationB It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networksC IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updatesD The primary limitation of router filtering is that it can only be applied on outbound updates

多选题When designing the coverage area for high call capacity, what two actions should be done with data rates and channels?()AAvoid channels with high AP co-channel interference.BUse channels with high AP co-channel interference to avoid channel roams.CSet the 2.4-GHz data rate of 5.5 Mb/s to required.DUse 5-GHz channels when possible.EUse 2.4-GHz channels when possible.

单选题What is true when designing OSPF import routing policy in JUNOS software?()AImport policies are not possible.BImport policies only match on external routes.CImport policies only match on internal routes.DImport policies can cause inconsistent link state databases.

单选题When designing activities in writing class, the teacher should take the following aspects into consideration EXCEPT ____.Astudents' language competenceBwriting strategiesCstudents' pronunciation of the topicDwriting purpose