To securely transport EIGRP traffic, a network administrator will build VPNs between sites. Whatis the best method to accomplish the transport of EIGRP traffic?()A、 IPSec in tunnel modeB、 IPSec in transport modeC、 GRE with IPSec in transport modeD、 GRE with IPSec in tunnel mode

To securely transport EIGRP traffic, a network administrator will build VPNs between sites. Whatis the best method to accomplish the transport of EIGRP traffic?()

  • A、 IPSec in tunnel mode
  • B、 IPSec in transport mode
  • C、 GRE with IPSec in transport mode
  • D、 GRE with IPSec in tunnel mode

相关考题:

Hyper Transport 技术的基础是由数据路径、控制信号和时钟信号组成的点对点单项链路。每一条数据路径都可以是2~32宽,标准总线宽度是2、4、8、16和32位。命令、地址和数据共用数据路径。链路由数据路径、控制信号和一个或多个时钟信号组成。基于完整的Hyper Transpor技术系统由处理器、总线和I/0组成。

Which of the following should be implemented to allow a user to securely connect to a network driveremotely?() A. Enable file and print shareB. FTPC. VPND. Map a drive

The VPN termination function provides the ability to connect two networks together securely over the internet. Which of these is true of IP addressing with regard to VPN termination?() A. termination devices need routable addresses inside the VPNB. termination devices need not routable addresses inside the VPNC. IGP routing protocols will update their routing tables over anIPsec VPND. addressing designs need to allow for summarization

After each container has been stuffed,responsible personnel will ensure that the doors have been securely closed and are watertight and a ______ has been placed on the container.A.realB.dealC.sealD.meal

Make sure the table is securely anchored.A:.repairedB: fixedC: clearedD: booked

work(请作答此空),systems that effectively isolate an organization's internal network structure from an ( ) network, such as the INTERNET is becoming increasingly popular. These firewall systems typically act as application-layer( )between networks, usually offering controlled TELNET, FTP, and SMTP access. With the emergence of more sophisticated( )layer protocols designed to facilitate global information discovery , there exists a need to provide a general ( )for these protocols to transparently and securely traverse a firewall.A.safeguardsB.firewallsC.routersD.switches

A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted

Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()A、Enable file and print shareB、FTPC、VPND、Map a drive

Danger area ().A、securedB、securesC、securingD、securely

How can mobile devices and wireless networks be secured?()A、 by securely deploying new applications with appropriate performance levelsB、 by providing security that is based on a multilayer,system-level approachC、 by looking subjectively at network traffic for abnormal flowsD、 by requiring a host-based hardware application

What is the purpose of the secure boot-config global configuration ?()A、takes a snapshot of the router running configuration and securely archives it in persistent storageB、stores a secured copy of the Cisco IOS image in its persistent storageC、backs up the Cisco IOS image from flash to a TFTP serverD、enables Cisco IOS image resilience

To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?()A、IPSec in tunnel modeB、IPSec in transport modeC、GRE with IPSec in transport modeD、GRE with IPSec in tunnel mode

A major difference between archiving and backing up data is that data backups:()A、contain data removed from the server.B、contain data that still resides on the server.C、are stored with the servers.D、are stored securely.

Which of the following tools can be used to securely connect to a remote system?()A、RCMDB、SSHC、TELNETD、HTTP

以下哪种数据加密技术可以在基础架构层面进行?()A、IPSecB、Secure Sockets LayerC、Transpor tLayer SecuritD、RSA

单选题To securely transport EIGRP traffic, a network administrator will build VPNs between sites. Whatis the best method to accomplish the transport of EIGRP traffic?()A IPSec in tunnel modeB IPSec in transport modeC GRE with IPSec in transport modeD GRE with IPSec in tunnel mode

单选题How can mobile devices and wireless networks be secured?()A by securely deploying new applications with appropriate performance levelsB by providing security that is based on a multilayer,system-level approachC by looking subjectively at network traffic for abnormal flowsD by requiring a host-based hardware application

单选题挽牢首、尾缆,放登艇梯。()AMake fast the fore and aft ropes and lay out the embarkation ladder.BEach cargo should be securely lashed.CWe’ll start loading right now.DMake fast the heaving rope, lay out the embarkation ladder.

单选题The VPN termination function provides the ability to connect two networks together securely over the internet. Which of these is true of IP addressing with regard to VPN termination?()Atermination devices need routable addresses inside the VPNBtermination devices need not routable addresses inside the VPNCIGP routing protocols will update their routing tables over anIPsec VPNDaddressing designs need to allow for summarization

单选题When pushing ahead,wires leading from the quarters of the after outboard barges to the bow of a towboat().Aprevent the towboat from sliding when the rudder is movedBprevent the barges from spreading out when backing downChold the towboat securely to the bargesDprevent the sidewise movement of the face barges

单选题A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()ARemotely connect to the user's laptop and review the network configuration settingsBPing the web server from inside the network to ensure it is still up and running.CCheck to make sure the company's website is accessible from the Internet.DEnsure the Ethernet cable is securely plugged into the user's laptop

单选题An administrator needs to update a router configuration for a router that does not support SSH.Which of the following can be used to securely update the router configuration?()AFTPBSNMPv2CTFTPDKTTPS

单选题You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall.  What should you do ( )?ACreate an IPsec tunnelBCreate an SSTP VPN connectionCCreate a PPTP VPN connectionDCreate an L2TP VPN connection

单选题The VPN termination function provides the ability to connect two networks together securely overthe internet. Which of these is true of IP addressing with regard to VPN termination?()A termination devices need routable addresses inside the VPNB termination devices need not routable addresses inside the VPNC IGP routing protocols will update their routing tables over an IPsec VPND addressing designs need to allow for summarization

名词解释题电子传递系统(electron transpor tsystem)