Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()
A.802.1X authentication
B.authentication proxy
C.Context Based Access Control
D.Lock and Key authentication
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. Available public Internet sites are sometimes used for estimating performance. Which statement regarding their use for estimating VPN performance is correct?()
A.Throughput results are valid as a value from the Teleworker's home to the corporate site, regardless of the location of the public test server.
B.Throughput results may not be valid due to the public server's location on the Internet and fluctuations based on the use of the public server.
C.Throughput values are not affected by the choice of split tunneling or Internet access through the VPN.
D.Throughput results are unrelated to the Teleworker PC configuration or current PC use.
A.256kbps / 1024kbps
B.256kbps / 1544kbps
C.160kbps / 768kbps
D.384kbps / 384kbps
E.128kbps / 512kbps
A.Process Switching
B.Silicon Switching
C.Cisco Express Forwarding (CEF) Switching
D.Autonomous Switching
A.Access Lists between the inside interface and loopback interface
B.Context Based Access Control
C.Dynamic Host Configuration Protocol
D.Network Address translation
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is _____.()
A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router
D.Cisco VPN3002 Hardware Client
E.Cisco SW VPN Client
最新試題
A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()
Which is not a reason that Internet Service Providers prefer to use PPP over Ethernet (PPoE)?()
Refer to the exhibit. Easy VPN operates in two modes. The exhibit represents network extension mode. Choose the best reason for using this mode.()
An Enterprise customer is concerned about the effort involved in allocating remote network addressing at the Teleworker location. What should you recommend to the customer?()
For Ethernet-to-Ethernet routers, such as the Cisco 831 behind a cable modem or DSL bridge, a traffic shaper is configured. This is required since the output 10-Mbps interface will not be congested. Which two statements are true?()
A customer wants to TFTP a new image from the corporate network to Flash on the Teleworker router through the IPSec tunnel. How should you configure the Teleworker router?()
A customer wants to deploy the Cisco Business Ready Teleworker solution, but is currently using a traditional (non-IP) PBX for voice services. What would you recommend to this customer?()
An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()
What are disadvantages of Network Address Translation Transparency?()
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()