单选题When is the site-to-site remote access model appropriate? ()Afor multiple ISDN connectionsBfor modem concentrated dial-up connectionsCfor a group of users in the same vicinity sharing a connectionDfor use by mobile users

题目
单选题
When is the site-to-site remote access model appropriate? ()
A

 for multiple ISDN connections

B

 for modem concentrated dial-up connections

C

 for a group of users in the same vicinity sharing a connection

D

 for use by mobile users


相似考题
更多“When is the site-to-site remote access model appropriate? ()”相关问题
  • 第1题:

    When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()

    • A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1
    • B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment
    • C、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place
    • D、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

    正确答案:A

  • 第2题:

    A route-based VPN is required for which scenario? ()

    • A、when the remote VPN peer is behind a NAT device
    • B、when multiple networks need to be reached across the tunnel
    • C、when the remote VPN peer is a dialup or remote access client
    • D、when a dynamic routing protocol such as OSPF is required across the VPN

    正确答案:D

  • 第3题:

    When is the site-to-site remote access model appropriate? ()

    • A、for multiple ISDN connections
    • B、for modem concentrated dial-up connections
    • C、for a group of users in the same vicinity sharing a connection
    • D、for use by mobile users

    正确答案:C

  • 第4题:

    A company is looking to improve upon their current remote management capabilities.  Thecompany must ensure that access is removed from all systems when a user is terminated and that administrators can remotely manage a system’s BIOS.  Which of the following remote management systems would support both these requirements?()

    • A、Remote management card
    • B、Terminal services
    • C、Remote desktop
    • D、LDAP enabled IP KVM

    正确答案:D

  • 第5题:

    A route-based VPN is required for which scenario?()

    • A、when the remote VPN peer is behind a NAT device
    • B、when multiple networks need to be reached across the tunnel and GRE cannot be used
    • C、when the remote VPN peer is a dialup or remote access client
    • D、when a dynamic routing protocol is required across the VPN and GRE cannot be used

    正确答案:D

  • 第6题:

    单选题
    You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()
    A

     Configure each server running Routing and Remote Access as a RADIUS Client.

    B

     Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.

    C

     Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.

    D

     Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    An organization hires a contractor who only needs access to email and a group calendar. They donot need administrator access to the computer. Which VPN model is the most appropriate?()
    A

     Thin Model

    B

     Thick Client

    C

     Port Forwarding

    D

     Clientless Access

    E

     Layer 3 Network Access


    正确答案: E
    解析: 暂无解析

  • 第8题:

    多选题
    A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()
    A

    Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.

    B

    Add the switch to the Junos Pulse Access Control Service using the Any make/model.

    C

    Add the switch as a firewall enforcer.

    D

    Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.


    正确答案: B,D
    解析: 暂无解析

  • 第9题:

    多选题
    For which two reasons are Integrated Services Routers well-positioned for the SMB market?()
    A

    They are integrated with firewall capabilities.

    B

    They scan packets for malicious activity.

    C

    They offer superior site-to-site routing.

    D

    They require no configuration to install.

    E

    They offer the best choice for remote access needs.


    正确答案: C,E
    解析: 暂无解析

  • 第10题:

    单选题
    When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()
    A

     It is recommended to place the VPN termination device in line with the Enterprise Edge 1

    B

     Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment

    C

     VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place

    D

     Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
    A

    Thin Model

    B

    Thick Client

    C

    Port Forwarding

    D

    Clientless Access

    E

    Layer 3 Network Access


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    When designing the routing for an Enterprise Campus network it is important to keep while of thefollowing filtering aspects in mind?()
    A

     Filtering is only useful when combined with route summarization

    B

     It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networks

    C

     IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updates

    D

     The primary limitation of router filtering is that it can only be applied on outbound updates


    正确答案: B
    解析: 暂无解析

  • 第13题:

    An organization hires a contractor who only needs access to email and a group calendar. They donot need administrator access to the computer. Which VPN model is the most appropriate?()

    • A、 Thin Model
    • B、 Thick Client
    • C、 Port Forwarding
    • D、 Clientless Access
    • E、 Layer 3 Network Access

    正确答案:D

  • 第14题:

    A policy-based IPsec VPN is ideal for which scenario?()

    • A、when you want to conserve tunnel resources
    • B、when the remote peer is a dialup or remote access client
    • C、when you want to configure a tunnel policy with an action of deny
    • D、when a dynamic routing protocol such as OSPF must be sent across the VPN

    正确答案:B

  • 第15题:

    For which two reasons are Integrated Services Routers well-positioned for the SMB market?()

    • A、They are integrated with firewall capabilities.
    • B、They scan packets for malicious activity.
    • C、They offer superior site-to-site routing.
    • D、They require no configuration to install.
    • E、They offer the best choice for remote access needs.

    正确答案:A,E

  • 第16题:

    When purchasing a UPS for a server room, which of the following are important factors to consider?()

    • A、Network card configuration
    • B、Remote access procedures
    • C、Estimated runtime
    • D、Maximum load
    • E、Power cord length

    正确答案:C,D

  • 第17题:

    You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()

    • A、 Configure each server running Routing and Remote Access as a RADIUS Client.
    • B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.
    • C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.
    • D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

    正确答案:A

  • 第18题:

    单选题
    When is the site-to-site remote access model appropriate? ()
    A

    for multiple ISDN connections

    B

    for modem concentrated dial-up connections

    C

    for a group of users in the same vicinity sharing a connection

    D

    for use by mobile users


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    The PWP teaching model is not considered appropriate in teaching_______.
    A

    reading

    B

    listening

    C

    writing

    D

    vocabulary


    正确答案: D
    解析:

  • 第20题:

    单选题
    You have a VPN server named Server1 and a file server named Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2). VPN clients report that they cannot access shares on Server2 after connecting to Server1. You confirm that VPN clients receive the appropriate IP configurations and that they have permissions to the shared folders on Server2. You need to ensure that VPN clients can access the shares on Server2 when they connect to the network by using a VPN connection.  What should you do? ()
    A

    From the Routing and Remote Access snap-in on Server2, enable IP Routing.

    B

    From the Routing and Remote Access snap-in on Server2, enable Link Control Protocol (LCP) extensions.

    C

    From Utility Manager on Server1, enable the Start automatically when I log on option.

    D

    In the local security policy on Server2, configure the Network Access: Shares that can be accessed anonymously setting.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    What is the benefit of using the Cisco Easy VPN Server feature along with the Cisco software VPN client for implementing remote-access VPNs? ()
    A

     The Cisco Easy VPN Server feature and the Cisco software VPN client use the same GUI configuration tool to simplify remote-access VPN configurations.

    B

     The Cisco Easy VPN Server feature allows the Cisco software VPN client to receive its security policies from the central site VPN device. This minimizes the configuration requirements at the remote location for large remote access VPN deployments.

    C

     The Cisco Easy VPN Server feature and the Cisco software VPN client use hardware-based encryption to reduce the CPU overhead of the central site VPN router.

    D

     The Cisco Easy VPN Server feature and the Cisco software VPN client enable scalable remote-access VPNs deployment by using a thick client/thin server model where the central site VPN router can handle thousands of incoming VPN connections.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Your network contains two offices named Office1 and Office2. The offices connect to each other by using a demand-dial connection.You add a new subnet in Office2.You need to ensure that a demand-dial connection starts when users attempt to connect to resources in the new Office2 subnet.What should you do from the Remote Routing and Access console?()
    A

    From the remote access server in Office2, right-click the demand-dial interface and click Connect.

    B

    From the remote access server in Office1, right-click the demand-dial interface and click Connect.

    C

    From the remote access server in Office1, right-click the demand-dial interface and click Update Routes.

    D

    From the remote access server in Office2, right-click the demand-dial interface and click Update Routes.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()
    A

     Configure the system event log to Do not overwrite.

    B

     In IAS, in Remote Access Logging, enable the Authentication requests setting.

    C

     Configure the Remote Access server to Log all events.

    D

     Create a custom remote access policy and configure it for Authentication-Type.


    正确答案: C
    解析: 暂无解析