A. packets per second B. number of remote sites C. throughput bandwidth D. number of tunnels
单项选择题In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
A. Easy VPN B. GRE tunneling C. Virtual Tunnel Interfaces D. DynamicMultipoint VPN E. Group Encrypted Transport VPN
多项选择题Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
A. fewer devices to manage B. moderate-to-high scalability C. stateful inspection of decrypted VPN traffic D. increased bandwidth with additional interfaces E. decreased complexity as traffic is filtered from the firewall
多项选择题Which two of these are advantages of placing the VPN device parallel to the firewall?()
A. high scalability B. the design supports a layered security model C. firewall addressing does not need to change D. IPsec decrypted traffic is inspected by the firewall E. there is a centralized point for logging and content inspection
单项选择题What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
A. RADIUS or LDAP B. an internal router running EIGRP C. Reverse Route Injection and OSPF or RIPv2 D. the VPN appliance to be deployed in line with the firewall
单项选择题What is the recommended practice when considering VPN termination and firewall placement?()
A. have the firewall and VPN appliance deployed in parallel B. place the VPN in line with the firewall, with the VPN terminating inside the firewall C. place the public side of the VPN termination device in the DMZ behind a firewall D. place the VPN in line with the firewall, with the VPN terminating outside the firewall