單項(xiàng)選擇題

Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()

A.802.1X authentication
B.authentication proxy
C.Context Based Access Control
D.Lock and Key authentication


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit. Available public Internet sites are sometimes used for estimating performance. Which statement regarding their use for estimating VPN performance is correct?()

A.Throughput results are valid as a value from the Teleworker's home to the corporate site, regardless of the location of the public test server. 
B.Throughput results may not be valid due to the public server's location on the Internet and fluctuations based on the use of the public server. 
C.Throughput values are not affected by the choice of split tunneling or Internet access through the VPN. 
D.Throughput results are unrelated to the Teleworker PC configuration or current PC use.

2.單項(xiàng)選擇題What is the minimum recommended uplink/downlink speed to support a single encrypted IP voice Teleworker call?()

A.256kbps / 1024kbps
B.256kbps / 1544kbps
C.160kbps / 768kbps
D.384kbps / 384kbps
E.128kbps / 512kbps

3.單項(xiàng)選擇題For best packet switching performance with crypto, what is the recommend packet switching path in a Cisco Teleworker Router?()

A.Process Switching
B.Silicon Switching 
C.Cisco Express Forwarding (CEF) Switching
D.Autonomous Switching

4.單項(xiàng)選擇題When implementing 802.1X on Teleworker routers and using separate DHCP address pools for Teleworker and Home-user devices, traffic between devices can be restricted. How can you best accomplish this?()

A.Access Lists between the inside interface and loopback interface
B.Context Based Access Control
C.Dynamic Host Configuration Protocol
D.Network Address translation

5.單項(xiàng)選擇題

Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is _____.()

A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router 
D.Cisco VPN3002 Hardware Client
E.Cisco SW VPN Client

最新試題

Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()

題型:?jiǎn)雾?xiàng)選擇題

An Enterprise customer is concerned about the effort involved in allocating remote network addressing at the Teleworker location. What should you recommend to the customer?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()

題型:?jiǎn)雾?xiàng)選擇題

Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()

題型:?jiǎn)雾?xiàng)選擇題

A customer wants to deploy the Cisco Business Ready Teleworker solution, but is currently using a traditional (non-IP) PBX for voice services. What would you recommend to this customer?()

題型:?jiǎn)雾?xiàng)選擇題

What characteristics make ADSL the likely choice among DSL technologies for Teleworker?()

題型:多項(xiàng)選擇題

A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Given the interface configuration on a DSL connection with PPPoE, select the true statement.()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()

題型:?jiǎn)雾?xiàng)選擇題

What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()

題型:多項(xiàng)選擇題