Users of a site-to-site VPN are reporting performance problems. The VPN connection employs IPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem?()A. Employ path MTU discovery.B. Set the MTU higher than 1500 bytes.C. Turn off pre-fragmentation for IPSec.D. Set the MTU value to 1400 bytes.

Users of a site-to-site VPN are reporting performance problems. The VPN connection employs IPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem?()

A. Employ path MTU discovery.

B. Set the MTU higher than 1500 bytes.

C. Turn off pre-fragmentation for IPSec.

D. Set the MTU value to 1400 bytes.


相关考题:

Your network contains two Active Directory forests named contoso.com and fabrikam.com.You have a standalone Network Policy Server (NPS) named NPS1.You have a VPN server named VPN1. VPN1 is configured as a RADIUS client to NPS1.You need to ensure that users from both forests can establish VPN connections by using their own domain accounts.What should you do?()A. On NPS1, configure remediation server groups.B. On NPS1, configure connection request policies.C. On VPN1, modify the DNS suffix search order.D. On VPN1, modify the IKEv2 Client connection controls.

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

You are an experienced network administrator in an international corporation. During your working hours, you are asked to deploy the Cisco SSL VPN AIM module in a Cisco 1800 Series Router. The beneficial reason for that deployment is to:()A. improve performance up to 300% for both IPsec and SSL VPN applicationsB. improve performance for both IPsec and SSL VPN applications with IPsec encryption taking place in hardwareC. improve performance up to 300% for both IPsec and SSL VPN applications with SSL encryption taking place in hardwareD. improve performance up to 200% for both IPsec and SSL VPN applications with encryption taking place in hardwareE. improve performance exclusively for SSL VPN applications

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?() A.Cisco IOS IPsec/SSL VPN clientB.Cisco VPN ClinetC.ISDN terminal adapterD.Cisco Adaptive Security Appliance

A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted

Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、DynamicMultipoint VPNE、Group Encrypted Transport VPN

Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、Dynamic Multipoint VPNE、Group Encrypted Transport VPN

Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()A、Cisco IOS IPsec/SSL VPN clientB、Cisco VPN ClinetC、ISDN terminal adapterD、Cisco Adaptive Security Appliance

You are an experienced network administrator in an international corporation. During your working hours, you are asked to deploy the Cisco SSL VPN AIM module in a Cisco 1800 Series Router. The beneficial reason for that deployment is to:()A、improve performance up to 300% for both IPsec and SSL VPN applicationsB、improve performance for both IPsec and SSL VPN applications with IPsec encryption taking place in hardwareC、improve performance up to 300% for both IPsec and SSL VPN applications with SSL encryption taking place in hardwareD、improve performance up to 200% for both IPsec and SSL VPN applications with encryption taking place in hardwareE、improve performance exclusively for SSL VPN applications

You are considering deploying the Cisco SSL VPN AIM module in a Cisco 1800 Series Router.Which benefit should you expect?()A、to improve performance exclusively for SSL VPN applicationsB、to improve performance up to 300% for both IPsec and SSL VPN applicationsC、to improve performance for both IPsec and SSL VPN applications with IPsec encryption taking place in hardwareD、to improve performance up to 200% for both IPsec and SSL VPN applications with encryption taking place in hardwareE、to improve performance up to 300% for both IPsec and SSL VPN applications with SSL encryption taking place in hardware

You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192.168.0.1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?() A、Configure the wireless network connection on Pro1 so that it has an IP address of 192. 168. 0. 2.B、Disable and then re-enable Internet Connection Sharing (ICS) on Pro1.C、Create a network bridge between the wired and wireless connections on Pro1.  D、Clear the Allow other network users to control or disable the shared Internet connection check box in the advanced properties of the VPN connection.

Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.

单选题You deploy a Windows Server 2008 R2 VPN server behind a firewall. Remote users connect to theVPN by using portable computers that run Windows 7. The firewall is configured to allow only secured Web communications.You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall. What should you do?()ACreate an IPsec tunnel.BCreate an SSTP VPN connection.CCreate a PPTP VPN connection.DCreate an L2TP VPN connection.

多选题Users of a site-to-site VPN are reporting performance problems. The VPN connection employs IPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem?()AEmploy path MTU discovery.BSet the MTU higher than 1500 bytes.CTurn off pre-fragmentation for IPSec.DSet the MTU value to 1400 bytes.

单选题You deploy a windows server 2008 VPN server behind a firewall. Remote uses connect to the VPN by using portable computers that run windows vista with the latest service pack. The firewall is configured to allows only secured web communications. You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall. What should you do?()ACreate an IPsec tunnel.BCreate an SSTP VPN connection.CCreate a PPTP VPN connection.DCreate a L2tp VPN connection.

多选题Users of a site-to-site VPN are reporting performance problems. The VPN connection employsIPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem?()AEmploy path MTU discovery.BSet the MTU higher than 1500 bytes.CTurn off pre-fragmentation for IPSec.DSet the MTU value to 1400 bytes.

单选题You are considering deploying the Cisco SSL VPN AIM module in a Cisco 1800 Series Router.Which benefit should you expect?()Ato improve performance exclusively for SSL VPN applicationsBto improve performance up to 300% for both IPsec and SSL VPN applicationsCto improve performance for both IPsec and SSL VPN applications with IPsec encryption taking place in hardwareDto improve performance up to 200% for both IPsec and SSL VPN applications with encryption taking place in hardwareEto improve performance up to 300% for both IPsec and SSL VPN applications with SSL encryption taking place in hardware

单选题You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall.  What should you do ( )?ACreate an IPsec tunnelBCreate an SSTP VPN connectionCCreate a PPTP VPN connectionDCreate an L2TP VPN connection

单选题Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients toact as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A Easy VPNB GRE tunnelingC Virtual Tunnel InterfacesD Dynamic Multipoint VPNE Group Encrypted Transport VPN

单选题You deploy a Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack.  The firewall is configured to allow only secured Web communications. You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall.What should you do?()ACreate an IPsec tunnel.BCreate an SSTP VPN connection.CCreate a PPTP VPN connection.DCreate an L2TP VPN connection.