A.Process Switching
B.Silicon Switching
C.Cisco Express Forwarding (CEF) Switching
D.Autonomous Switching
您可能感興趣的試卷
你可能感興趣的試題
A.Access Lists between the inside interface and loopback interface
B.Context Based Access Control
C.Dynamic Host Configuration Protocol
D.Network Address translation
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is _____.()
A.Cisco PIX 501 Firewall
B.Cisco 831 router
C.Cisco 837 router
D.Cisco VPN3002 Hardware Client
E.Cisco SW VPN Client
A.Issue a show policy-map interface command.
B.Assuming Netflow is enabled, issue a show ip cache verbose flow command.
C.Issue a show crypto ipsec session command.
D.Issue a debug qos set command and a terminal monitor command.
A.IP phone extensions for teleworkers must be chosen carefully so not to duplicate campus phone extensions.
B.More security exposure exists due to lack of support for Intrusion Detection System and URL filtering for teleworker originated traffic.
C.Compressed RTP and IPSec are not compatible and result in no bandwidth savings.
D.Broadband modems must support Quality of Service for adequate voice quality.
Refer to the exhibit. The Linksys router in the diagram is performing pNAT (port network address translation). What hash algorithm should you choose and why?()
A.Use hash MD5 to ensure that IKE works through NAT.
B.Use ah-sha-hmac, as it does not check the integrity of the IP header. The IP header will change due to NAT.
C.Use 3DES, as it will encrypt the IPSec header IP addresses and bypass addressing issues.
D.Use esp-sha-hmac, as it does not check the integrity of the IP header. The IP header will change due to NAT.
最新試題
Refer to the exhibit. Which statement is true regarding the topology?()
Refer to the exhibit. Select the true statement.()
What are disadvantages of Network Address Translation Transparency?()
A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()
An Enterprise customer is concerned about the effort involved in allocating remote network addressing at the Teleworker location. What should you recommend to the customer?()
Refer to the exhibit. Given this deployment model, what capability must the Broadband Router provide for the Enterprise applications to function properly?()
A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()
Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()
An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()