单选题To securely transport EIGRP traffic, a network administrator will build VPNs between sites. Whatis the best method to accomplish the transport of EIGRP traffic?()A IPSec in tunnel modeB IPSec in transport modeC GRE with IPSec in transport modeD GRE with IPSec in tunnel mode

单选题
To securely transport EIGRP traffic, a network administrator will build VPNs between sites. Whatis the best method to accomplish the transport of EIGRP traffic?()
A

 IPSec in tunnel mode

B

 IPSec in transport mode

C

 GRE with IPSec in transport mode

D

 GRE with IPSec in tunnel mode


参考解析

解析: 暂无解析

相关考题:

Together with the network layer,the transport layer is the heart of the protocol( )The network layer provides end-to-end( ) delivery using datagrams or virtual circuits.The transport layer builds on the network layer to provide data transport from a process on a( )machine to a process on a destination machine with a desired level of reliability that is independent of the physical ( ) currently in use.It provides the abstractions that applications nedd to use the network..Without the( ) layer,the whole concept of layered protocols would make little sense.A.transport B.network C.hierarchy D.service A.packet B.data C.command D.record A.connection B.terminal C.source D.destination A.traffic B.connection C.lines D.networks A.network B.transport C.link D.physical

Refer to the exhibit. BigBids Incorporated is a worldwide auction provider. The network uses EIGRP as its routing protocol throughout the corporation. The network administrator does not understand the convergence of EIGRP. Using the output of the show ip eigrp topology all - links command, answer the administrator‘s questions.Which three networks is the router at 172.17.10.2 directly connected to?()A. 172.17.0.0/30B. 172.17.1.0/24C. 172.17.2.0/24D. 172.17.3 .0/25E. 172.17.3.128/25F. 172.17.10.0/24

After implementing EIGRP on your network, you issue the show ip eigrp traffic command on router C. The following output is shown:What information can you determine about this network?() A. The network is stableB. There is a flapping link or interface, and router C knows an alternate path to the networkC. There is a flapping link or interf ace, and router C does not know an alternate path to the networkD. EIGRP is not working correctly on router CE. There is not enough information to make a determination

After implementing EIGRP on your network, you issue the show ip eigrp traffic command on router C. The following output is shown:What can you conclude about this network? () A. The network has been stable for at least the last 45 minutesB. There is a flapping link or interf ace, and router C knows an alternate path to the networkC. There is a flapping link or interface, and router A does not know an alternate path to the networkD. EIGRP is not working correctly on router CE. There is not enough information to make a determination

A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A. RIP v1B. RIP v2C. IGRPD. OSPFE. EIGRP

Refer to the exhibit. ROUTE.com has just implemented this EIGRP network. A network administrator came to you for advice while trying to implement load balancing across part of their EIGRP network. If the variance value is configured as 2 on all routers and all o ther metric and K values are configured to their default values, traffic from the Internet to the data center will be load balanced across how many paths? ()A. 1B. 2C. 3D. 4E. 5

Refer to the exhibit.The actual speed of the serial links between R2 and R3 are 256 kb/s and 512k b/s respectively. When configuring EIGRP on routers R2 and R3, the network administrator configured the bandwidth of both serial interfaces to 512 kb/s. What will be the effect?()A. EIGRP will overutilize the 512 kb/s link.B. The interface delay value used in the EIGRP metric calculation will be inaccurate on the 256k b/s serial interface.C. The amount of bandwidth used for EIGRP routing protocol traffic on the 256 kb/s link can become excessive.D. EIGRP can load balance between the two serial links only if the variance is set to 2 or higher.E. Unequal cost load balancing will be disabled.

What parameters must you specify when you enable EIGRP routing?() A. The broadcast address, and AS numberB. The network number and AS numberC. EIGRP routing, network number and passive interfaceD. EIGRP routing, network number, and AS

To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?() A. IPSec in tunnel modeB. IPSec in transport modeC. GRE with IPSec in transport modeD. GRE with IPSec in tunnel mode

A network administrator is troubleshooing an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information?()A. Router# show ip eigrp adjacencyB. Router# show ip eigrp topologyC. Router# show ip eigrp interfacesD. Router# show ip eigrp neighbors

The network administrator of the Oregon router adds the follwing command to the router configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1. What are the results of adding this command?() A. The command establishes a static routeB. The command invokes a dynamic routing protocol for 192.168.12.0C. Traffic for network 192.168.12.0 is forwarded to 172.16.12.1D. Traffic for all networks is forwarded to 172.16.12.1E. This route is automatically propagated throughout the entire networkF. Traffic for network 172.16.12.0 is forwarded to the 192.168.12.0 network

A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted

A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A、RIP v1B、RIP v2C、IGRPD、OSPFE、EIGRP

The network administrator of the Oregon router adds the follwing command to the router configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1. What are the results of adding this command?()A、The command establishes a static routeB、The command invokes a dynamic routing protocol for 192.168.12.0C、Traffic for network 192.168.12.0 is forwarded to 172.16.12.1D、Traffic for all networks is forwarded to 172.16.12.1E、This route is automatically propagated throughout the entire networkF、Traffic for network 172.16.12.0 is forwarded to the 192.168.12.0 network

Overlay Transport Virtualization (OTV) uses the Authoritative Edge Device (AED) to perform which tasks?()A、 The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.B、 The AED is responsible for load balancing all traffic for all VLANs across the transport network.C、 The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.D、 The AED is responsible for MAC address dispute contention for a given VLAN.

What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions

What is a static packet-filtering firewall used for ?()A、It validates the fact that a packet is either a connection request or a data packet belonging to a connectionB、It evaluates network packets for valid data at the application layer before allowing connectionsC、It analyzes network traffic at the network and transport protocol layersD、It keeps track of the actual communication process through the use of a state table

What parameters must you specify when you enable EIGRP routing?()A、The broadcast address, and AS numberB、The network number and AS numberC、EIGRP routing, network number and passive interfaceD、EIGRP routing, network number, and AS

How can mobile devices and wireless networks be secured?()A、 by securely deploying new applications with appropriate performance levelsB、 by providing security that is based on a multilayer,system-level approachC、 by looking subjectively at network traffic for abnormal flowsD、 by requiring a host-based hardware application

If voice and data traffic will be sent and received via a WAN links, what must be configured to provide a certain amount of dedicated bandwidth and to prioritize the voice traffic over other types of network traffic?()A、IPSec VPNB、QoS mechanismC、FirewallD、NATE、EIGRP routing protocolF、Static routing

A network administrator is troubleshooing an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information?()A、Router# show ip eigrp adjacencyB、Router# show ip eigrp topologyC、Router# show ip eigrp interfacesD、Router# show ip eigrp neighbors

A router has EIGRP configured as the only routing protocol. How does EIGRP respond if there is no feasible successor route to a destination network and the successor route fails?()A、It immediately sends its entire routing table to its neighbors.B、EIGRP sends a Hello packet to the DR to inform it of the route failure.C、It automatically forwards traffic to a fallback default route until a successor route is found.D、It sends queries out to neighbors until a new successor route is found.E、It places the route in holddown until LSA updates inform it of a new route to the network.

A network administrator is viewing the control plane traffic flowing through their network in real-time. What built-in feature enabled this ability?()A、call homeB、wiresharkC、ethanalyzerD、NX-OS

To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?()A、IPSec in tunnel modeB、IPSec in transport modeC、GRE with IPSec in transport modeD、GRE with IPSec in tunnel mode

You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

单选题How can mobile devices and wireless networks be secured?()A by securely deploying new applications with appropriate performance levelsB by providing security that is based on a multilayer,system-level approachC by looking subjectively at network traffic for abnormal flowsD by requiring a host-based hardware application

单选题Overlay Transport Virtualization (OTV) uses the Authoritative Edge Device (AED) to perform which tasks?()A The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.B The AED is responsible for load balancing all traffic for all VLANs across the transport network.C The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.D The AED is responsible for MAC address dispute contention for a given VLAN.