A.all traffic is encrypted using IPSec and the Triple-DES algorithm
B.full support for all Enterprise applications, including data, voice, and video
C.thousands of Teleworker VPN tunnels can be aggregated to a headquarters location
D.the VPN tunnel is an always on site-to-site VPN connection
E.portability for use while traveling
F.used with broadband Cable/DSL subscriptions
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()
A.ip dhcp pool Client
B.network 10.1.1.0 255.255.255.240
C.default-router 10.1.1.1
D.dns-server 10.2.2.2
E.domain-name cisco.com
F.option 150 ip 10.3.3.3
A.IPM should not be run on a production network.
B.IPM helps verify if a Service Provider is meeting the Service Level Agreement.
C.IPM contains a database that can store data on latency, jitter, and drops of voice packets over a period of weeks or months.
D.The QoS service policy should contain an allocation of sufficient bandwidth in the priority queue (LLQ) for both the SAA probe simulating a voice call and the voice call. If not, voice quality will suffer.
A.Authentication Proxy
B.802.1X
C.Context-Based Access Control
D.Intrusion Detection System
E.Stateful firewall
A.IPSec
B.IPSec with GRE
C.DMVPN
D.EZVPN
E.all of the choices
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()
A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router
D.Cisco VPN3002 Hardware Client
E.Cisco ubr925 cable modem
F.Cisco SW VPN Client
最新試題
A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()
When IP Telephony is deployed for Teleworkers using the Cisco Business Ready Teleworker solution, which statements are true?()
A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()
Refer to the exhibit. Which statement is true regarding the topology?()
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
When is an IPSec SA built on the Teleworker Router?()
When is it appropriate to enable Link Fragmentation and Interleaving (LFI) on DSL connections for Teleworkers?()
Choose the false statement concerning the use of CiscoWorks Internetwork Performance Monitor (IPM) in a Teleworker deployment.()
An Enterprise customer is concerned about the effort involved in allocating remote network addressing at the Teleworker location. What should you recommend to the customer?()
Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()