Which two statements are true about L2TP tunnels?() (Choose two.)
第1题:
A. The statistics show savings for all CIFS traffic.
B. The traffic transfered over 4,000 seconds faster.
C. There was a bandwidth savings of almost 68.9%.
D. The acceleration is only working for 68.9% of the traffic
第2题:
A.It establishes a static route to the 172.16.3.0 network
B.It establishes a static route to the 192.168.2.0 network
C.It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network
D.It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4
E.It uses the default administrative distance
F.It is a route that would be used last if other routes to the same destination exist
第3题:
Which two statements are true about voice packets in a LAN? (Choose two.) ()
第4题:
Which two statements are true when source/destination filters are enabled? ()(Choose two.)
第5题:
Which two statements are true for a security policy? ()(Choose two.)
第6题:
Which two statements are true with regard to policy ordering? ()(Choose two.)
第7题:
Click the Exhibit button.Which two are correct about CIFS acceleration based on the exhibit?() (Choose two.)
第8题:
The statistics show savings for all CIFS traffic.
The traffic transfered over 4,000 seconds faster.
There was a bandwidth savings of almost 68.9%.
The acceleration is only working for 68.9% of the traffic
第9题:
It controls inter-zone traffic.
It controls intra-zone traffic.
It is named with a system-defined name.
It controls traffic destined to the device's ingress interface.
第10题:
Tunnels are initiated by the LAC
Tunnels are initiated by the LNS
By default, subscriber authentication occurs on the LNS
By default, subscriber authentication occurs on the LAC
第11题:
It establishes a static route to the 172.16.3.0 network.
It establishes a static route to the 192.168.2.0 network.
It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.
It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.
It uses the default administrative distance.
It is a route that would be used last if other routes to the same destination exist.
第12题:
They are always present in the NAT table.
They allow connection to be initiated from the outside.
They can be configured with access lists,to allow two or more connections to be initiated from the outside.
They require no inside or outside interface markings because addresses are statically defined.
第13题:
A. They are always present in the NAT table.
B. They allow connection to be initiated from the outside.
C. They can be configured with access lists, to allow two or more connections to be initiated from the outside.
D. They require no inside or outside interface markings because addresses are statically defined.
第14题:
Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4 (Choose two.)()。
第15题:
Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)()
第16题:
Which two statements are true about network voice traffic? (Choose two.)()
第17题:
Which two statements are true regarding L2TP? ()(Choose two.)
第18题:
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
第19题:
It establishes a static route to the 172.16.3.0 network
It establishes a static route to the 192.168.2.0 network
It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network
It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4
It uses the default administrative distance
It is a route that would be used last if other routes to the same destination exist
第20题:
Traffic is clear text
Traffic is encrypted
They are initiated by the LNS
They are initiated by the LAC
第21题:
The last policy is the default policy, which allows all traffic.
The order of policies is not important.
New policies are placed at the end of the policy list.
The insert command can be used to change the order.
第22题:
It is necessary to forward ARP requests to remote hosts.
It is necessary when translated traffic belongs to the same subnet as the ingress interface.
It is not automatic and you must configure it.
It is enabled by default and you do not need to configure it.
第23题:
Traffic is permitted from the trust zone to the untrust zone.
Intrazone traffic in the trust zone is permitted.
All traffic through the device is denied.
The policy is matched only when no other matching policies are found.