A. high scalability
B. the design supports a layered security model
C. firewall addressing does not need to change
D. IPsec decrypted traffic is inspected by the firewall
E. there is a centralized point for logging and content inspection
您可能感興趣的試卷
你可能感興趣的試題
A. RADIUS or LDAP
B. an internal router running EIGRP
C. Reverse Route Injection and OSPF or RIPv2
D. the VPN appliance to be deployed in line with the firewall
A. have the firewall and VPN appliance deployed in parallel
B. place the VPN in line with the firewall, with the VPN terminating inside the firewall
C. place the public side of the VPN termination device in the DMZ behind a firewall
D. place the VPN in line with the firewall, with the VPN terminating outside the firewall
A. Thin Model
B. Thick Client
C. Port Forwarding
D. Clientless Access
E. Layer 3 Network Access
A. Layer 2
B. Layer 3
C. in-band
D. out-of-band
E. edge
F. central
A. NAC can authenticate using 802.1X and IBNS cannot
B. NAC can ensure only compliant machines connect and IBNS cannot
C. NAC can ensure access to the correct network resources and IBNS cannot
D. NAC can manage user mobility and reduce overhead costs and IBNS cannot
最新試題
You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()
Which technology allows centralized storage services to be shared across different VSANs?()
What is the recommended radius of a cell for a voice-ready wireless network?()
You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()