单选题It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()A IPSecB IPSec with GREC DMVPND EZVPNE all of the choices

题目
单选题
It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()
A

IPSec

B

IPSec with GRE

C

DMVPN

D

EZVPN

E

all of the choices


相似考题
参考答案和解析
正确答案: B
解析: 暂无解析
更多“It is considered a best practice to use the Dead Peer Detect”相关问题
  • 第1题:

    Popular as it might be, the Presentation-Practice-Production teaching model is not considered appropriate in teaching__________.

    A.phonetics
    B.grammar
    C.vocabulary
    D.reading

    答案:D
    解析:
    考查3P教学法。阅读教学一般采用PWP方法,即Pre-reading,While-reading,Post-reading。

  • 第2题:

    Software Engineering is best described as ( ).

    A. the practice of designing, building, and maintaining off-the-shelf software from prefabricated parts
    B. the practice of designing, building, and maintaining ad-hoc software without the use of formal methods
    C. the practice of designing, building, and maintaining reliable and cost-effective software using standard techniques
    D. the practice of designing, building, and maintaining fast and flexible software specifically for engineering applications



    答案:C
    解析:
    解析:翻译:对软件工程最恰当的描述是( )。A.从定制化软件到成本软件的设计、开发和维护B.非常规的专用软件的设计、开发和维护C.采用常规方法的可靠的、高性价比的软件的设计、开发和维护D.针对工程应用的快速敏捷性软件的设计、开发和维护

  • 第3题:

    Which three parameters are configured in the IKE policy?()

    • A、mode
    • B、preshared key
    • C、external interface
    • D、security proposals
    • E、dead peer detection settings

    正确答案:A,B,D

  • 第4题:

    An administrator is in charge of a server that houses various applications. Which of the following BEST explains this server type?()

    • A、Dedicated Application Server
    • B、File Server
    • C、Shared Application Server
    • D、Peer-to-Peer Application Server

    正确答案:C

  • 第5题:

    It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()

    • A、IPSec
    • B、IPSec with GRE
    • C、DMVPN
    • D、EZVPN
    • E、all of the choices

    正确答案:E

  • 第6题:

    When cabling a rack, which of the following is BEST practice?()

    • A、 Use rack specific cabling hardware
    • B、 Let cables hang loosely behind the servers
    • C、 Channel all power cables down the sides, and all network cables down the center
    • D、 Keep cables close to the front of the rack for better access

    正确答案:A

  • 第7题:

    For an enterprise to use one of the reserved private IP address ranges, as best practice they shouldcoordinate with:()

    • A、their legal department
    • B、IANA
    • C、IEEE
    • D、their IT department

    正确答案:D

  • 第8题:

    Which two reflect best practices for client peering sessions in a BGP route reflection network? ()(Choose two.)

    • A、peer with route-reflectors within the cluster
    • B、peer with route-reflectors outside the cluster
    • C、peer with route-reflector-clients within the cluster
    • D、peer with route-reflector-clients outside the cluste

    正确答案:A,C

  • 第9题:

    单选题
    When cabling a rack, which of the following is BEST practice?()
    A

     Use rack specific cabling hardware

    B

     Let cables hang loosely behind the servers

    C

     Channel all power cables down the sides, and all network cables down the center

    D

     Keep cables close to the front of the rack for better access


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    For an enterprise to use one of the reserved private IP address ranges, as best practice they shouldcoordinate with:()
    A

    their legal department

    B

    IANA

    C

    IEEE

    D

    their IT department


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Users at the Charleville Company began experiencing high network delays when Internetconnectivity was enabled for all users. After investigating the traffic flow, you determine that peer-to-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoSmechanism can you implement to improve the network response time?()
    A

     Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.

    B

     Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions. 

    C

     Use class-based policing to limit the peer-to-peer traffic rate.

    D

     Use class-based shaping to delay any excessive peer-to-peer traffic.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    From viewpoint of practice, it is sometimes important to detect abnormal happenings in the running gear by()
    A

    a keen sense of hearing

    B

    rich theory

    C

    communicating ability with others

    D

    repetition work


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which of the following statements about meaningful practice in grammar teaching is NOT true?

    A.Meaningful practice aims at form accuracy.
    B.Meaningful practice focuses on the production and comprehension of meaning.
    C.There is no clear cut between mechanical and meaningful practice.
    D.Practice based on prompts is usually considered as meaningful practice.

    答案:A
    解析:
    考查语法操练类型。语法练习包括机械型练习、意义型练习与交际型练习。机械型练习注重形式的准确性.意义型练习注重意义的产生、理解或互换,二者没有明显的分割。以图画、图表、关键词等提示信息为基础的语法练习通常被看作是意义型练习。故选A。

  • 第14题:

    Which two mechanisms can be used to detect IPsec GRE tunnel failures?()

    • A、Dead Peer Detection (DPD)
    • B、CDP
    • C、isakmp keepalives
    • D、GRE keepalive mechanism
    • E、The hello mechanism of the routing protocol across the IPsec tunnel

    正确答案:A,E

  • 第15题:

    Which of the following is best practice when disposing of used equipment?()

    • A、Donating to a non-profit group
    • B、Use a local recycling company
    • C、Send equipment back to manufacturer
    • D、Following local laws

    正确答案:D

  • 第16题:

    Which three parameters are configured in the IKE policy?() (Choose three.)

    • A、mode
    • B、preshared key
    • C、external interface
    • D、security proposals
    • E、dead peer detection settings

    正确答案:A,B,D

  • 第17题:

    Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()

    • A、Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
    • B、Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
    • C、Use class-based policing to limit the peer-to-peer traffic rate.
    • D、Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C

    正确答案:C

  • 第18题:

    Which of the following provides the BEST security and accountability for a Data Center?()

    • A、Entry logging
    • B、Combination locks
    • C、Card keys
    • D、Dead bolts

    正确答案:C

  • 第19题:

    A system has a critical need for network services on a small network with a limited number of hosts. System overhead is not a concern. Which of the following should the system administrator do to help ensure connectivity in the event of a gateway failure?()

    • A、Use the ifconfig command to enable dead gate detection
    • B、Use the no command to set active dead gateway detection
    • C、Use the route command to set active dead gateway detection
    • D、Add the line active_dgd=1 to the /etc/gated.conf command and refresh the gated daemon

    正确答案:C

  • 第20题:

    You have an Exchange Server 2010 organization with mailbox server in a lab environment.The lab is not connected to internet.You need to verify autodiscover is configured correctly for client connectivity.What will you use?()

    • A、Best practice analyzer
    • B、Remote connectivity analyzer
    • C、Test-MAPIconnectivity cmdlet
    • D、Test-outlookWeb services cmdlet

    正确答案:D

  • 第21题:

    单选题
    It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()
    A

    IPSec

    B

    IPSec with GRE

    C

    DMVPN

    D

    EZVPN

    E

    all of the choices


    正确答案: E
    解析: 暂无解析

  • 第22题:

    单选题
    Click the Exhibit button. Referring to the exhibit, which statement contains the correct gateway parameters?()
    A

    [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }

    B

    [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }

    C

    [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }

    D

    [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    Which two mechanisms can be used to detect IPsec GRE tunnel failures?()
    A

    Dead Peer Detection (DPD)

    B

    CDP

    C

    isakmp keepalives

    D

    GRE keepalive mechanism

    E

    The hello mechanism of the routing protocol across the IPsec tunnel


    正确答案: B,D
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following statements about meaningful practice is NOT true?
    A

    Meaningful practice aims at form accuracy.

    B

    Meaningful practice focuses on the production and comprehension of meaning.

    C

    There is no clear cut between mechanical and meaningful practice.

    D

    Practice based on prompts is usually considered as meaningful practice.


    正确答案: A
    解析: