單項(xiàng)選擇題An important limitation of the Cisco Business Ready Teleworker solution is_____.()

A.IP phone extensions for teleworkers must be chosen carefully so not to duplicate campus phone extensions.
B.More security exposure exists due to lack of support for Intrusion Detection System and URL filtering for teleworker originated traffic.
C.Compressed RTP and IPSec are not compatible and result in no bandwidth savings.
D.Broadband modems must support Quality of Service for adequate voice quality.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit. The Linksys router in the diagram is performing pNAT (port network address translation). What hash algorithm should you choose and why?()

A.Use hash MD5 to ensure that IKE works through NAT. 
B.Use ah-sha-hmac, as it does not check the integrity of the IP header. The IP header will change due to NAT. 
C.Use 3DES, as it will encrypt the IPSec header IP addresses and bypass addressing issues. 
D.Use esp-sha-hmac, as it does not check the integrity of the IP header. The IP header will change due to NAT.

2.單項(xiàng)選擇題

Refer to the exhibit. A Teleworker router is deployed behind a broadband Cable service. If the Teleworker router has the configuration shown, what will be the DNS server selected for DHCP clients on the LAN-side interface?()

A.DHCP clients will automatically default to the DNS root servers for all DNS requests in the IP stacks locally. 
B.DHCP clients will use the IP set in the option 150 command.
C.DHCP clients will use the DNS entry assigned by the ISP.
D.DHCP clients will have no DNS server set in the IP stack.

3.多項(xiàng)選擇題Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().

A.requires access lists to identify the voice traffic 
B.can allow traffic from a device without 802.1X authentication, by MAC address
C.can allow traffic from Cisco IP phones by listening to their CDP advertisements
D.allows all packets marked with a ToS of 5 to bypass authentication
E.allows all IP voice packets to bypass authentication via stateful inspection

4.多項(xiàng)選擇題Your Service Provider does not support Link Fragmentation and Interleave, but upstream serialization delay on your broadband link is affecting voice quality. Which two mitigation strategies are viable?()

A.Upgrade your residential broadband service to at least 768kbps uplink.
B.Switch your home router to use PPP encapsulation.
C.Use the ip tcp adjust-mss interface command.
D.Employ QoS techniques to drop large data packets.
E.Use traffic shaping to interrupt large data packets.

5.單項(xiàng)選擇題

Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is().

A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router 
D.Cisco VPN3002 Hardware Client
E.Cisco ubr925 cable modem
F.Cisco SW VPN Client

最新試題

When IP Telephony is deployed for Teleworkers using the Cisco Business Ready Teleworker solution, which statements are true?()

題型:多項(xiàng)選擇題

What characteristics make ADSL the likely choice among DSL technologies for Teleworker?()

題型:多項(xiàng)選擇題

Refer to the exhibit. Easy VPN operates in two modes. The exhibit represents network extension mode. Choose the best reason for using this mode.()

題型:?jiǎn)雾?xiàng)選擇題

When is an IPSec SA built on the Teleworker Router?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()

題型:?jiǎn)雾?xiàng)選擇題

For Ethernet-to-Ethernet routers, such as the Cisco 831 behind a cable modem or DSL bridge, a traffic shaper is configured. This is required since the output 10-Mbps interface will not be congested. Which two statements are true?()

題型:多項(xiàng)選擇題

A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()

題型:?jiǎn)雾?xiàng)選擇題

Choose the false statement concerning the use of CiscoWorks Internetwork Performance Monitor (IPM) in a Teleworker deployment.()

題型:?jiǎn)雾?xiàng)選擇題

A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()

題型:?jiǎn)雾?xiàng)選擇題

An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()

題型:?jiǎn)雾?xiàng)選擇題