A route-based VPN is required for which scenario? ()
第1题:
When using the Cisco SDM Quick Setup Siteto-Site VPN wizard, which three parameters do you configure?()
第2题:
You have a VPN server named Server1 and a file server named Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2). VPN clients report that they cannot access shares on Server2 after connecting to Server1. You confirm that VPN clients receive the appropriate IP configurations and that they have permissions to the shared folders on Server2. You need to ensure that VPN clients can access the shares on Server2 when they connect to the network by using a VPN connection. What should you do? ()
第3题:
A policy-based IPsec VPN is ideal for which scenario?()
第4题:
When configuring a Cisco Adaptive Security Appliance in multiple context mode, which of the follow capabilities are supported?()
第5题:
An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()
第6题:
A route-based VPN is required for which scenario?()
第7题:
You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()
第8题:
when you want to conserve tunnel resources
when the remote peer is a dialup or remote access client
when you want to configure a tunnel policy with an action of deny
when a dynamic routing protocol such as OSPF must be sent across the VPN
第9题:
To ensure the router has the correct time when generating its private/public key pairs.
To ensure the router has the correct time when checking certificate validity from the remote peers
To ensure the router time is sync with the remote peers for encryption keys generation
To ensure the router time is sync with the remote peers during theDH exchange
To ensure the router time is sync with the remote peers when generating the cookies during IKE phase 1
第10题:
A route-based VPN generally uses less resources than a policy-based VPN.
A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.
A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.
A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN
第11题:
dynamic reconfiguration
path MTU discovery
auto setup
remote management
第12题:
Multicastis supported
Dynamic routing protocols are supported
VPN configurations are supported
Static routes are supported
第13题:
The LAN-side of the Teleworker router is assigned private IP address space (RFC1918), and the VPN topology is IPSec-only (no GRE protocol). When is it required to configure NAT/pNAT on the Teleworker router?()
第14题:
Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()
第15题:
Which VPN management feature would be considered to ensure that the network had the least disruption of service when making topology changes?()
第16题:
Why is NTP an important component when implementing IPSec VPN in a PKI environment?()
第17题:
Regarding a route-based versus policy-based IPsec VPN, which statement is true?()
第18题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users. What should you do? ()
第19题:
Configure each server running Routing and Remote Access as a RADIUS Client.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
第20题:
when the remote VPN peer is behind a NAT device
when multiple networks need to be reached across the tunnel
when the remote VPN peer is a dialup or remote access client
when a dynamic routing protocol such as OSPF is required across the VPN
第21题:
dynamic reconfiguration
path MTU discovery
auto setup
remote management
第22题:
when the remote VPN peer is behind a NAT device
when multiple networks need to be reached across the tunnel and GRE cannot be used
when the remote VPN peer is a dialup or remote access client
when a dynamic routing protocol is required across the VPN and GRE cannot be used
第23题:
It is recommended to place the VPN termination device in line with the Enterprise Edge 1
Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment
VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place
Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7