An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()A、Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.B、Configure pNAT to ensure Voice over IP packets are properly translated.C、Configure IOS firewall to permit RTP port numbers through the firewall via VPN. D、Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.
An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
- A、Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.
- B、Configure pNAT to ensure Voice over IP packets are properly translated.
- C、Configure IOS firewall to permit RTP port numbers through the firewall via VPN.
- D、Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.
相关考题:
Sometimes people decide that being tan is better than being pale. Sometimes they decide the opposite.() 此题为判断题(对,错)。
A typical purpose of placement tests is____ . A.to find out problemsB.to decide what to teach.C.to assign students to different-level classesD.to decide how to teach next
Red Hat Enterprise Linux版本分为( )。A.Red Hat Enterprise Linux ASB.Red Hat Enterprise Linux ESC.Red Hat Enterprise Linux BSD.Red Hat Enterprise Linux WS
You can install Cisco DCNM-LAN on a supported version of which two operating systems? ()A、 Microsoft Windows ServerB、 Novell SUSE Linux Enterprise ServerC、 Oracle Enterprise LinuxD、 Red Hat Enterprise LinuxE、 VMware ESX
Router R1 sits at an Enterprise branch office, using both the Internet and a leased line to another Enterprise router for its two connectivity options back into the rest of the Enterprise network. The engineer planning for this branch decided to use the leased line for all Enterprise traffic, unless it fails, in which case the Internet connection should be used to pass traffic to the Enterprise. Which of the following is most likely to be useful on the branch router?()A、IPsec tunnelB、GRE tunnelC、Floating stati c routeD、An IGP
A customer has a requirement for a server to run Windows Server 2003 Enterprise Edition and Exchange 2003 Enterprise Edition. It has been determined that 4GB RAM will be needed. The customer is trying to decide between the two following configurations: (1)An IBM xSeries x366 with 4 Xeon MP processors and 4 x 1GB memory DIMMs. (2)An IBM xSeries x445 with 4 Xeon MP processors and 8 x 1GB memory DIMMs. Which question should be asked to guide the customer in selecting the correct memory configuration?()A、Is rack space an issue?B、Is there a high cache-hit ratio?C、Is this a mission-critical application?D、Are there plans to expand the memory to 8GB in the future?
erp意思是()A、enterprise resources productsB、enterprise resources planC、enterprise reform productsD、enterprise revolution plan
The Cisco Lifecycle Services approach is primarily applicable to which type of companies?() A、 the large enterprise with a global presenceB、 the large enterprise with a single campusC、 the small- or medium-sized businessD、 All companies, regardless of size
As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)A、cost savingsB、product varietyC、well-tested interoperabilityD、regular upgrade process
Which of the following processor technologies is typically supported on current enterprise class UNIX servers but not enterprise class Windows Servers?()A、RISCB、CISCC、Multi-threadingD、64-bit
Your company has an Active Directory domain. All servers run Windows Server 2008 R2. Your company uses an Enterprise Root certification authority (CA) and an Enterprise Intermediate CA. The Enterprise Intermediate CA certificate expires. You need to deploy a new Enterprise Intermediate CA certificate to all computers in the domain. What should you do()A、Import the new certificate into the Intermediate Certification Store on the Enterprise Root CA server.B、Import the new certificate into the Intermediate Certification Store on the Enterprise Intermediate CA server.C、Import the new certificate into the Intermediate Certification Store in the Default Domain Controllers group policy object.D、Import the new certificate into the Intermediate Certification Store in the Default Domain group policy object.
You need to identify the combinations of the Windows operating system and SQL Server 2005 version that will be the most appropriate for the new RD configuration, which will include the Research, Parts, and Engineering databases.Which two combinations will be the most appropriate?()A、Windows Server 2003 Enterprise Edition with SQL Server 2005 Enterprise EditionB、Windows Server 2003 Datacenter Edition with SQL Server 2005 Enterprise EditionC、Windows Server 2003 Standard Edition with SQL Server 2005 Enterprise EditionD、Windows Server 2003 Enterprise Edition with SQL Server 2005 Standard Edition
单选题Router R1 sits at an Enterprise branch office, using the Internet for its only connectivity back to the rest of the EnterprisE. Which of the following is not a ben efit of using an IPsec tunnel for packets sent through the Internet, between R1 and the rest of the Enterprise?()APrivacyBAuthenticationCAllows using an IGP between R1 and the EnterpriseDSecure communications
多选题Red Hat Enterprise Linux版本分为()。ARed Hat Enterprise LinuxASBRed Hat Enterprise LinuxESCRed Hat Enterprise LinuxBSDRed Hat Enterprise LinuxWS
单选题You need to design a PKI solution that meets business and security requirements. What should you do?()AImplement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offlineBImplement an enterprise root CA in the corp.woodgrovebank.com domainCImplement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offlineDImplement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains
单选题Which of the following includes Active Memory Sharing (AMS)?()APowerHA Enterprise EditionBPowerVM Enterprise EditionCVMControl Enterprise EditionDSystems Director Enterprise Edition
单选题You need to design a PKI for Litware, Inc. What should you do?()AAdd one offline stand-alone root certificate authority(CA).Add two online enterprise subordinate CAsBAdd one online stand-alone root certification authority(CA).Add two online enterprise subordinate CAsCAdd one online enterprise root certification authority CA).Add one offline enterprise subordinate CADAdd one online enterprise root certification authority(CA).Add two online enterprise subordinate CAs
多选题Router R1 sits at an Enterprise branch office, using both the Internet and a leased line to another Enterprise router for its two connectivity options back into the rest of the Enterprise network. The engineer planning for this branch decided to use the leased line for all Enterprise traffic, unless it fails, in which case the Internet connection should be used to pass traffic to the Enterprise. Which of the following is most likely to be useful on the branch router?()AIPsec tunnelBGRE tunnelCFloating stati c routeDAn IGP
多选题You can install Cisco DCNM-LAN on a supported version of which two operating systems? ()AMicrosoft Windows ServerBNovell SUSE Linux Enterprise ServerCOracle Enterprise LinuxDRed Hat Enterprise LinuxEVMware ESX