for multiple ISDN connections
for modem concentrated dial-up connections
for a group of users in the same vicinity sharing a connection
for use by mobile users
第1题:
When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()
第2题:
A route-based VPN is required for which scenario? ()
第3题:
When is the site-to-site remote access model appropriate? ()
第4题:
A company is looking to improve upon their current remote management capabilities. Thecompany must ensure that access is removed from all systems when a user is terminated and that administrators can remotely manage a system’s BIOS. Which of the following remote management systems would support both these requirements?()
第5题:
A route-based VPN is required for which scenario?()
第6题:
Configure each server running Routing and Remote Access as a RADIUS Client.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
第7题:
Thin Model
Thick Client
Port Forwarding
Clientless Access
Layer 3 Network Access
第8题:
Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.
Add the switch to the Junos Pulse Access Control Service using the Any make/model.
Add the switch as a firewall enforcer.
Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.
第9题:
They are integrated with firewall capabilities.
They scan packets for malicious activity.
They offer superior site-to-site routing.
They require no configuration to install.
They offer the best choice for remote access needs.
第10题:
It is recommended to place the VPN termination device in line with the Enterprise Edge 1
Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment
VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place
Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
第11题:
Thin Model
Thick Client
Port Forwarding
Clientless Access
Layer 3 Network Access
第12题:
Filtering is only useful when combined with route summarization
It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networks
IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updates
The primary limitation of router filtering is that it can only be applied on outbound updates
第13题:
An organization hires a contractor who only needs access to email and a group calendar. They donot need administrator access to the computer. Which VPN model is the most appropriate?()
第14题:
A policy-based IPsec VPN is ideal for which scenario?()
第15题:
For which two reasons are Integrated Services Routers well-positioned for the SMB market?()
第16题:
When purchasing a UPS for a server room, which of the following are important factors to consider?()
第17题:
You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()
第18题:
for multiple ISDN connections
for modem concentrated dial-up connections
for a group of users in the same vicinity sharing a connection
for use by mobile users
第19题:
reading
listening
writing
vocabulary
第20题:
From the Routing and Remote Access snap-in on Server2, enable IP Routing.
From the Routing and Remote Access snap-in on Server2, enable Link Control Protocol (LCP) extensions.
From Utility Manager on Server1, enable the Start automatically when I log on option.
In the local security policy on Server2, configure the Network Access: Shares that can be accessed anonymously setting.
第21题:
The Cisco Easy VPN Server feature and the Cisco software VPN client use the same GUI configuration tool to simplify remote-access VPN configurations.
The Cisco Easy VPN Server feature allows the Cisco software VPN client to receive its security policies from the central site VPN device. This minimizes the configuration requirements at the remote location for large remote access VPN deployments.
The Cisco Easy VPN Server feature and the Cisco software VPN client use hardware-based encryption to reduce the CPU overhead of the central site VPN router.
The Cisco Easy VPN Server feature and the Cisco software VPN client enable scalable remote-access VPNs deployment by using a thick client/thin server model where the central site VPN router can handle thousands of incoming VPN connections.
第22题:
From the remote access server in Office2, right-click the demand-dial interface and click Connect.
From the remote access server in Office1, right-click the demand-dial interface and click Connect.
From the remote access server in Office1, right-click the demand-dial interface and click Update Routes.
From the remote access server in Office2, right-click the demand-dial interface and click Update Routes.
第23题:
Configure the system event log to Do not overwrite.
In IAS, in Remote Access Logging, enable the Authentication requests setting.
Configure the Remote Access server to Log all events.
Create a custom remote access policy and configure it for Authentication-Type.