The VPN termination function provides the ability to connect two networks together securely over the internet. Which of these is true of IP addressing with regard to VPN termination?() A. termination devices need routable addresses inside the VPNB. termination devices need not routable addresses inside the VPNC. IGP routing protocols will update their routing tables over anIPsec VPND. addressing designs need to allow for summarization

The VPN termination function provides the ability to connect two networks together securely over the internet. Which of these is true of IP addressing with regard to VPN termination?()

A. termination devices need routable addresses inside the VPN

B. termination devices need not routable addresses inside the VPN

C. IGP routing protocols will update their routing tables over anIPsec VPN

D. addressing designs need to allow for summarization


相关考题:

As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A. inline with a firewallB. in a DMZ outside the firewallC. parallel with a firewallD. in a DMZ behind the firewall

What is the recommended practice when considering VPN termination and firewall placement?() A. have the firewall and VPN appliance deployed in parallelB. place the VPN in line with the firewall, with the VPN terminating inside the firewallC. place the public side of the VPN termination device in the DMZ behind a firewallD. place the VPN in line with the firewall, with the VPN terminating outside the firewall

A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted

If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()A、A sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkB、A sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedC、A SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorD、A SHAM link is part of OSPF network of MPLS-VPN provider

The VPN termination function provides the ability to connect two networks together securely overthe internet. Which of these is true of IP addressing with regard to VPN termination?()A、 termination devices need routable addresses inside the VPNB、 termination devices need not routable addresses inside the VPNC、 IGP routing protocols will update their routing tables over an IPsec VPND、 addressing designs need to allow for summarization

Company.com has decided to implement VPN for all network traffic. How might this might affect HACMP?()  A、 Only the heartbeat IP network can exist in a VPN style network.B、 HACMp must have separate VPN’s for all ’non-service’ and ’service’ adapter networks.C、 If a VPN is used for IP traffic the heartbeating must be done over disk connections.D、 HACMP can exist in a VPN network environment,but special considerations must be addressed.

When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

What is the purpose of configuring the router as a PPPoE client?()A、to provide VPN access over L2TPB、to enable PPP session from the router to the termination device at the headend for metro Ethernet connectivityC、for DSL connectivity and removing the need for the end - user PC to ru n the PPPoE client softwareD、for connecting the router to a cable modem, which bridges the Ethernet frames from the router to the cable modem termination system

The VPN termination function provides the ability to connect two networks together securely over the internet. Which of these is true of IP addressing with regard to VPN termination?()A、termination devices need routable addresses inside the VPNB、termination devices need not routable addresses inside the VPNC、IGP routing protocols will update their routing tables over anIPsec VPND、addressing designs need to allow for summarization

For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()A、Broadband serviceB、Headend VPN deviceC、VPN access deviceD、Tunnel

Which configuration component is required to allow a PPP over ATM client to connect to one virtual router for a particular session and to a different virtual router for another session?()A、profileB、domain mapC、IP access-routeD、static IP addressing

What is the recommended practice when considering VPN termination and firewall placement?()A、 have the firewall and VPN appliance deployed in parallelB、 place the VPN in line with the firewall, with the VPN terminating inside the firewallC、 place the public side of the VPN termination device in the DMZ behind a firewallD、 place the VPN in line with the firewall, with the VPN terminating outside the firewall

Routers can be used to integrate a variety of services. Which two common services are often specified by businesses?()A、 Mitigation and ResponseB、 Fibre Channel over EthernetC、 IP communicationsD、 Data Center VirtualizationE、 VPN security

Which two statements are true about broadband cable (HFC) systems?()A、Cable modems only operate at Layer 1 of the OSI model.B、Cable modems operate at Layers 1 and 2 of the OSI model.C、Cable modems operate at Layers 1, 2, and 3 of the OSI model.D、A function of the cable modem termination system (CMTS) is to convert the modulated signal from the cable modem into a digital signal.E、A function of the cable modem termination system is to convert the digital data stream from the end user host into a modulated RF signal for transmission onto the cable system.

As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A、 inline with a firewallB、 in a DMZ outside the firewallC、 parallel with a firewallD、 in a DMZ behind the firewall

Your network contains a Routing and Remote Access server named RRAS1 and a DHCP server named DHCP1. RRAS1 and DHCP1 are located in different subnets.RRAS1 is configured to support VPN connections from the Internet. DHCP1 has a scope that provides IP addresses for the VPN connections.You need to ensure that VPN clients that connect to RRAS1 can receive IP addresses from DHCP1.What should you do?()A、On DHCP1, configure a DHCP Relay Agent.B、On DHCP1, install the Routing role service.C、On RRAS1, configure a DHCP Relay Agent.D、On RRAS1, install the Routing role service.

单选题Company.com has decided to implement VPN for all network traffic. How might this might affect HACMP?()A Only the heartbeat IP network can exist in a VPN style network.B HACMp must have separate VPN’s for all ’non-service’ and ’service’ adapter networks.C If a VPN is used for IP traffic the heartbeating must be done over disk connections.D HACMP can exist in a VPN network environment,but special considerations must be addressed.

单选题As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()Ainline with a firewallBin a DMZ outside the firewallCparallel with a firewallDin a DMZ behind the firewall

单选题The VPN termination function provides the ability to connect two networks together securely over the internet. Which of these is true of IP addressing with regard to VPN termination?()Atermination devices need routable addresses inside the VPNBtermination devices need not routable addresses inside the VPNCIGP routing protocols will update their routing tables over anIPsec VPNDaddressing designs need to allow for summarization

多选题Which two statements are correct with regard to route distinguisher as defined in RFC 4364-AKA IP-VPN(MPLS-VPN)?()AThe configuration to define Route-Distinguisher is Ip vrf bulle Rd 1:1BA route distinguisher can be imported and exported to and from a VRFCRoute-Distinguisher is an 8 byte BGP attribute value used in influencing BGP best path algorithm.DRoute-Distinguisher is an 8 byte value used in creating unique VPNv4 address.

单选题As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A inline with a firewallB in a DMZ outside the firewallC parallel with a firewallD in a DMZ behind the firewall

单选题What is the purpose of configuring the router as a PPPoE client?()Ato provide VPN access over L2TPBto enable PPP session from the router to the termination device at the headend for metro Ethernet connectivityCfor DSL connectivity and removing the need for the end - user PC to ru n the PPPoE client softwareDfor connecting the router to a cable modem, which bridges the Ethernet frames from the router to the cable modem termination system

单选题You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall.  What should you do ( )?ACreate an IPsec tunnelBCreate an SSTP VPN connectionCCreate a PPTP VPN connectionDCreate an L2TP VPN connection

单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A It is recommended to place the VPN termination device in line with the Enterprise Edge 1B Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

单选题For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()ABroadband serviceBHeadend VPN deviceCVPN access deviceDTunnel

单选题The VPN termination function provides the ability to connect two networks together securely overthe internet. Which of these is true of IP addressing with regard to VPN termination?()A termination devices need routable addresses inside the VPNB termination devices need not routable addresses inside the VPNC IGP routing protocols will update their routing tables over an IPsec VPND addressing designs need to allow for summarization

单选题What is the recommended practice when considering VPN termination and firewall placement?()A have the firewall and VPN appliance deployed in parallelB place the VPN in line with the firewall, with the VPN terminating inside the firewallC place the public side of the VPN termination device in the DMZ behind a firewallD place the VPN in line with the firewall, with the VPN terminating outside the firewall