單項(xiàng)選擇題

Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()

A.UDP ports 16384 through 32727
B.ESP packets less than 113 byes
C.DiffServ codepoint EF Expedited Forwarding
D.RTP ports 6970 through 6999


您可能感興趣的試卷

你可能感興趣的試題

2.單項(xiàng)選擇題

Refer to the exhibit. Available public Internet sites are sometimes used for estimating performance. Which statement regarding their use for estimating VPN performance is correct?()

A.Throughput results are valid as a value from the Teleworker's home to the corporate site, regardless of the location of the public test server. 
B.Throughput results may not be valid due to the public server's location on the Internet and fluctuations based on the use of the public server. 
C.Throughput values are not affected by the choice of split tunneling or Internet access through the VPN. 
D.Throughput results are unrelated to the Teleworker PC configuration or current PC use.

3.單項(xiàng)選擇題What is the minimum recommended uplink/downlink speed to support a single encrypted IP voice Teleworker call?()

A.256kbps / 1024kbps
B.256kbps / 1544kbps
C.160kbps / 768kbps
D.384kbps / 384kbps
E.128kbps / 512kbps

4.單項(xiàng)選擇題For best packet switching performance with crypto, what is the recommend packet switching path in a Cisco Teleworker Router?()

A.Process Switching
B.Silicon Switching 
C.Cisco Express Forwarding (CEF) Switching
D.Autonomous Switching

5.單項(xiàng)選擇題When implementing 802.1X on Teleworker routers and using separate DHCP address pools for Teleworker and Home-user devices, traffic between devices can be restricted. How can you best accomplish this?()

A.Access Lists between the inside interface and loopback interface
B.Context Based Access Control
C.Dynamic Host Configuration Protocol
D.Network Address translation

最新試題

A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()

題型:單項(xiàng)選擇題

What is not a difference between VPN tunnel authentication and per-user authentication?()

題型:單項(xiàng)選擇題

Which statement regarding 802.1X is true?()

題型:單項(xiàng)選擇題

An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Easy VPN operates in two modes. The exhibit represents network extension mode. Choose the best reason for using this mode.()

題型:單項(xiàng)選擇題

Refer to the exhibit. Given the DHCP pool configuration shown on Router A, the Cisco IP phone will not boot up in the Teleworker location. What is missing from the Teleworker DHCP pool configuration?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Select the true statement.()

題型:單項(xiàng)選擇題

Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()

題型:單項(xiàng)選擇題

An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()

題型:單項(xiàng)選擇題