Refer to the exhibit. Given this deployment model, what capability must the Broadband Router provide for the Enterprise applications to function properly?()
A.IPSec tunnel termination B.DHCP C.hardware-accelerated IPSec encryption D.Traffic Shaping E.Split-tunneling
单项选择题AcustomerwantstoTFTPanewimagefromthecorporatenetworktoFlashontheTeleworkerrouterthroughtheIPSectunnel.HowshouldyouconfiguretheTeleworkerrouter?()
A.No additional steps are required. B.Add the appropriate source-interface command. C.The router cannot access a server in the Enterprise Campus network. D.The Teleworker Router does not have any client applications; therefore this type of request is not possible.
多项选择题Refer to the exhibit. Given this DSL routers sub-interface configuration, select the two true statements. Assume the interface is UP UP.()
A.The interface must be configured as point-to-multipoint B.The sustained cell rate and the burst rate are equal C.The router's configuration will also include a Dialer interface D.The configuration must also include a sub-interface with a VPI/VCI of 8/35
单项选择题Refer to the exhibit. Which statement is true regarding the topology?()
A.An IPSec tunnel cannot be established between Router A and Router B B.The Linksys Firewall router does not support PPPoE C.Destination addresses defined in RFC 1918 are not supported within an IPSec tunnel D.The phone and PC behind Router A will not be able to connect to a host on 192.168.1.0/24
单项选择题Refer to the exhibit. Easy VPN operates in two modes. The exhibit represents network extension mode. Choose the best reason for using this mode.()
A.Teleworker devices must be accessed from the central site (server, printers). B.IP addressing is simplified. C.The Teleworker LAN is a transit networking for routing. D.The Teleworker router is an MPLS PE node.
多项选择题WhataredisadvantagesofNetworkAddressTranslationTransparency?()
A.There is no disadvantage. B.It will add 16 bytes per packet of overhead(8 bytes UDP header, and 8 bytes of NON-IKE Marker). C.It will add 36 bytes per packet of overhead (20 bytes of IP header, 8 bytes of UDP header, 8 bytes of NON-IKE Marker). D.It will require that both crypto peers support this feature in the IOS version. Both crypto peers must also have this feature enabled.