A.Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.
B.Configure pNAT to ensure Voice over IP packets are properly translated.
C.Configure IOS firewall to permit RTP port numbers through the firewall via VPN.
D.Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.
您可能感興趣的試卷
你可能感興趣的試題
A.There is lower bandwidth consumption for VoIP media streams.
B.Teleworkers can have the same extensions and inward-dialing numbers at their office desks and home offices.
C.Personal calls are routed directly through the residential PSTN line.
D.Teleworkers can have different extensions at their office desks and home offices.
E.There is less burden on Cisco CallManager for signaling traffic.
F.Incoming calls are first routed to the office desks, then to the home offices.
A.most widely deployed by service providers
B.provides asymmetrical bandwidth, including high speed downlink
C.data rate is affected by distance to the Central Office
D.provides the furthest reach at T1 speeds
E.supports connection of two routers without the use of a DSL access concentrator
A.when the router is booted up
B.when the router administratively does a no shutdown" on the IPSec SA
C.when traffic matches a line of the access-list tied into the crypto-map in the router configuration, and that particular IPSec SA is not already up
D.when the ISAKMP SA completes negotiation of all IPSec SAs (one per access-list line in the crypto ACL), it will be brought up immediately
A.Deployment of Business Ready Teleworker with VoIP is not recommended.
B.The customer’s existing PBX must first be replaced with Cisco IP Telephony solution.
C.Business Ready Teleworker and Cisco IP Telephony can be deployed in parallel to the existing PBX, integrating the two with trunking.
D.Deployment is recommended only for full-time Teleworkers who have no other corporate phone.
A.VPN tunnel authentication is part of the IKE specification.
B.VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
C.User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization.
D.802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.
最新試題
Which is not a reason that Internet Service Providers prefer to use PPP over Ethernet (PPoE)?()
Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()
What are disadvantages of Network Address Translation Transparency?()
In a Teleworker deployment with a single IP phone connected to a Cisco 831 router, select the true statement regarding Call Admission Control.()
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()
What are the DSL-specific factors that require additional bandwidth when supporting Voice-over-IP over an IPSec VPN?()
Choose the false statement concerning the use of CiscoWorks Internetwork Performance Monitor (IPM) in a Teleworker deployment.()
When is it appropriate to enable Link Fragmentation and Interleaving (LFI) on DSL connections for Teleworkers?()
Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()