A.most widely deployed by service providers
B.provides asymmetrical bandwidth, including high speed downlink
C.data rate is affected by distance to the Central Office
D.provides the furthest reach at T1 speeds
E.supports connection of two routers without the use of a DSL access concentrator
您可能感興趣的試卷
你可能感興趣的試題
A.when the router is booted up
B.when the router administratively does a no shutdown" on the IPSec SA
C.when traffic matches a line of the access-list tied into the crypto-map in the router configuration, and that particular IPSec SA is not already up
D.when the ISAKMP SA completes negotiation of all IPSec SAs (one per access-list line in the crypto ACL), it will be brought up immediately
A.Deployment of Business Ready Teleworker with VoIP is not recommended.
B.The customer’s existing PBX must first be replaced with Cisco IP Telephony solution.
C.Business Ready Teleworker and Cisco IP Telephony can be deployed in parallel to the existing PBX, integrating the two with trunking.
D.Deployment is recommended only for full-time Teleworkers who have no other corporate phone.
A.VPN tunnel authentication is part of the IKE specification.
B.VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
C.User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization.
D.802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.
A.Inbound packets are permitted only if they are part of a legitimate data flow initiated by a device on the Teleworker home network.
B.All packets are checked for integrity by analyzing their checksum.
C.Every packet is checked to see if it was sent through the VPN tunnel.
D.Every packet is inspected to see if any disallowed URLs are included. URLs are forwarded to the security cache engine for authorization.
Refer to the exhibit. Given the interface configuration on a DSL connection with PPPoE, select the true statement.()
A.The router is limiting the size of TCP and UDP packets.
B.The configuration implements an effective Layer-2 fragmentation technique.
C.The value of 542 is recommended in several RFCs.
D.There is another upstream router terminating the PPPoE session.
最新試題
It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()
Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()
A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()
When IP Telephony is deployed for Teleworkers using the Cisco Business Ready Teleworker solution, which statements are true?()
Refer to the exhibit. Select the true statement.()
An Enterprise customer is concerned about the effort involved in allocating remote network addressing at the Teleworker location. What should you recommend to the customer?()
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()
Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()