A.There is no disadvantage.
B.It will add 16 bytes per packet of overhead(8 bytes UDP header, and 8 bytes of NON-IKE Marker).
C.It will add 36 bytes per packet of overhead (20 bytes of IP header, 8 bytes of UDP header, 8 bytes of NON-IKE Marker).
D.It will require that both crypto peers support this feature in the IOS version. Both crypto peers must also have this feature enabled.
您可能感興趣的試卷
你可能感興趣的試題
A.access control and billing can be done on a per-user, rather than a per-site basis
B.supports Link Fragmentation and Interleaving
C.provides the ability to connect a network of hosts over a simple bridging access device
D.provides a consistent means of authenticating users (RADIUS for example)
A.uplink speed less than 768kbps
B.supporting Voice-over-IP
C.using PPPoE encapsulation
D.using PPPoA encapsulation
E.uplink speed greater than 768kbps
A.Remark the traffic on ingress and prioritize on egress.
B.Enable CEF and Netflow.
C.Configure the MS-Windows QoS Scheduler to prioritize this traffic.
D.Enable WRED.
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
A.Twenty bytes of header will be replaced with five bytes.
B.If the IPSec transform set includes Authentication Header, the receiving IPSec peer will discard the packets.
C.The IPSec packets will be dropped by Router A's compression logic.
D.The voice packets will not be compressed.
A.A voice packet is sent via multiple fixed-length cells; a portion of the last cell is padding, requiring more bandwidth.
B.ADSL typically uses PPPoE encapsulation, which adds additional overhead to each voice packet.
C.A voice packet is sent via multiple fixed-length cells; each cell has about 10% Layer-2 header overhead.
D.IPSec requires additional overhead for the header and hash.
E.ADSL carrier band requires additional bits to be carried over the wire to the DSL Access Concentrator.
最新試題
Refer to the exhibit. Easy VPN operates in two modes. The exhibit represents network extension mode. Choose the best reason for using this mode.()
When IP Telephony is deployed for Teleworkers using the Cisco Business Ready Teleworker solution, which statements are true?()
What is not a difference between VPN tunnel authentication and per-user authentication?()
Refer to the exhibit. Which statement is true regarding the topology?()
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()
Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()
Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()
For Ethernet-to-Ethernet routers, such as the Cisco 831 behind a cable modem or DSL bridge, a traffic shaper is configured. This is required since the output 10-Mbps interface will not be congested. Which two statements are true?()