an LSP for each local CE device
an LSP for each remote PE device
an LSP for each remote CE device
an LSP for each CE facing interface
第1题:
Which two steps are required for a Kompella Layer 2 VPN?()
第2题:
Which condition must be met to allow a PE router to forward VPN traffic across a LSP in a Layer 3 VPN environment?()
第3题:
How should a router that is being used in a Frame Relay network be configured to avoid split horizon issues from preventing routing updates?()
第4题:
Two Label-Switched Paths called LSP A and LSP B have been configured on a router. LSP A has been configured with a hold-priority of 3. There is insufficient reservable bandwidth along the path to accomodate both LSPs reservation requirements. Which setup priority must LSP B have to pre-empt LSP A and use its bandwidth?()
第5题:
You are the systems engineer for your company. The network consists of a single Active Directory domain. The company has a main office and two branch offices. All servers run Windows Server 2003. All client computers run either Windows XP Professional or Windows 2000 Professional. Each branch office maintains a dedicated 256-Kbps connection to the main office. Each office also maintains a T1 connection to the Internet. Each office has a Microsoft Internet Security and Acceleration (ISA) Server 2000 computer, which provides firewall and proxy services on the Internet connection. Each branch office contains one domain controller and five servers that are not domain controllers. There is minimal administrative staff at the branch offices. A new company policy states that all servers must now be remotely administered by administrators in the main office. The policy states that all remote administration connections must be authenticated by the domain and that all traffic must be encrypted. The policy also states that the remote administration traffic must never be carried in clear text across the Internet. You choose to implement remote administration by enabling Remote Desktop connections on all servers on the network. You decide to use the Internet-connected T1 lines for remote administration connectivity between offices. Because administrative tasks might require simultaneous connections to multiple servers across the network, you need to ensure that administrators do not lose connections to servers in one office when they attempt to connect to servers in another office. What should you do? ()
第6题:
Configure each server running Routing and Remote Access as a RADIUS Client.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
第7题:
Install Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clients
Install Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clients
Create a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connection
Create a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connection
第8题:
Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface.
Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.
Configure many sub-interfaces on the same subnet.
Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces.
第9题:
第10题:
Configure Routing and Remote Access on one server in each branch office. Create L2TP/IPSec VPN ports on these servers. Create new VPN connections on the administrators’ computers to connect to the VPN servers in the branch offices.
Configure a VPN server in each branch office. Create connections that use IPSec Authentication Header (AH) in tunnel mode from the main office connect to VPN servers in the branch offices.
Configure a local L2TP/IPSec VPN connection on the ISA Server 2000 firewall computer in the main office. Configure the ISA Server 2000 firewall computers at the branch offices as remote L2TP/IPSec VPN servers.
Configure a local PPTP VPN connection on the ISA Server 2000 firewall computers in each branch office. Configure the ISA Server 2000 firewall computer at the main office as a remote PPTP VPN server.
第11题:
Configure a site id for each ce.
Configure a VPN label for each VPN.
Configure a MP-bgp session to each pe.
Configure an Extended LDP Session to each pe.
第12题:
Configure each server running Routing and Remote Access as a RADIUS Client.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
第13题:
PE1 has connections to VPN sites that are served by three remote PE routers. How many LSPs must be established to support 2547bis?()
第14题:
In a configuration with redundant supervisors, how many IP addresses are required to configure full remote access via management 0?()
第15题:
At a minimum how many NICs must a machine have to host virtual machines?()
第16题:
You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()
第17题:
You need to design a remote access authentication strategy that will allow users in the IT department to remotely connect to the network. Your solution must meet security requirements. What should you do?()
第18题:
an LSP for each local CE device
an LSP for each remote PE device
an LSP for each remote CE device
an LSP for each CE facing interface
第19题:
Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface
Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic
Configure many sub-interfaces on the same subnet
Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces
第20题:
2
3
4
7
第21题:
two IP addresses, one for each supervisor
three IP addresses, one virtual IP and one physical IP for each supervisor
one IP address that is shared among supervisors
none—management 0 will use the IP address from the first SVI that is created
第22题:
One NIC will support all virtual machines
One for each virtual machine and one for management
Three for each virtual machine
Two for each virtual machine and one for management
第23题:
an LSP for each local CE device
an LSP for each remote PE device
an LSP for each remote CE device
an LSP for each CE facing interface
第24题:
The BGP next hop must be in inet.1.
The BGP next hop must be in inet.3.
Must have a bidirectional LSP configured.
Must have a static route to allow an RP for connected interfaces.