多項(xiàng)選擇題Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().

A.requires access lists to identify the voice traffic 
B.can allow traffic from a device without 802.1X authentication, by MAC address
C.can allow traffic from Cisco IP phones by listening to their CDP advertisements
D.allows all packets marked with a ToS of 5 to bypass authentication
E.allows all IP voice packets to bypass authentication via stateful inspection


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Your Service Provider does not support Link Fragmentation and Interleave, but upstream serialization delay on your broadband link is affecting voice quality. Which two mitigation strategies are viable?()

A.Upgrade your residential broadband service to at least 768kbps uplink.
B.Switch your home router to use PPP encapsulation.
C.Use the ip tcp adjust-mss interface command.
D.Employ QoS techniques to drop large data packets.
E.Use traffic shaping to interrupt large data packets.

2.單項(xiàng)選擇題

Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is().

A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router 
D.Cisco VPN3002 Hardware Client
E.Cisco ubr925 cable modem
F.Cisco SW VPN Client

3.單項(xiàng)選擇題Select a key benefit of DSL.()

A.TCP packet sizes can be optimized by the router so there is no IPSec or AAL5 padding.
B.The local loop is a dedicated connection for a single subscriber to the DSLAM. 
C.Access to the WAN media uses a poll/response mechanism so no two subscribers transmit at the same time. 
D.There are no distance requirements from the Central Office (CO). 

4.單項(xiàng)選擇題

Refer to the exhibit. Asymmetric broadband service with significantly greater downstream bandwidth is recommended for Teleworker deployment. Which reason is the most accurate?()

A.Most ISPs do not provide QoS for residential broadband. Asymmetric bandwidth reduces the chance of downstream congestion when traffic from Internet sites competes for bandwidth with IP voice traffic.
B.Additional downstream bandwidth compensates for insufficient upstream bandwidth. The aggregate bandwidth provides the same result. 
C.The additional bandwidth is needed to access more than one site. Most HTTP traffic is downstream. 
D.The additional downstream bandwidth allows the Enterprise VPN device to send the IP voice packets much faster, allowing them to reach the Teleworker network with less latency.

5.單項(xiàng)選擇題The LAN-side of the Teleworker router is assigned private IP address space (RFC1918), and the VPN topology is IPSec-only (no GRE protocol). When is it required to configure NAT/pNAT on the Teleworker router?()

A.when all access to the Internet is through the IPSec tunnel
B.when there is direct Internet access via split-tunneling
C.when there is no Internet access configured through the Teleworker router
D.whenever you have IOS-Firewall (CBAC) configured

最新試題

Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()

題型:單項(xiàng)選擇題

An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Easy VPN operates in two modes. The exhibit represents network extension mode. Choose the best reason for using this mode.()

題型:單項(xiàng)選擇題

In a Teleworker deployment with a single IP phone connected to a Cisco 831 router, select the true statement regarding Call Admission Control.()

題型:單項(xiàng)選擇題

It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()

題型:單項(xiàng)選擇題

What is not a difference between VPN tunnel authentication and per-user authentication?()

題型:單項(xiàng)選擇題

Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()

題型:單項(xiàng)選擇題

Refer to the exhibit. Given this DSL router's sub-interface configuration, select the two true statements. Assume the interface is UP/UP.()

題型:多項(xiàng)選擇題

When IP Telephony is deployed for Teleworkers using the Cisco Business Ready Teleworker solution, which statements are true?()

題型:多項(xiàng)選擇題

Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()

題型:單項(xiàng)選擇題