Refer to the exhibit.
Which three statements describe the steps that are required to configure an IPsec site-to-site VPN using a GRE tunnel?()
A.The command access-list 110 permit gre must be configured to specify which traffic will be encrypted.
B.The command access-list 110 permit ip must be configured to specify which hosts can use the tunnel.
C.The tunnel destination 172.17.63.18 command must be configured on the Tunnel0 interface.
D.The tunnel mode gre command must be configured on the Tunnel0 interface.
E.The tunnel source Ethernet1 command must be configured on the Tunnel0 interface.
F.The tunnel source Tunnel0 command must be configured on the Tunnel0 interface.
您可能感興趣的試卷
你可能感興趣的試題
A.AlarmSeverity
B.AlarmKeepalive
C.AlarmTraits
D.EventMedia
E.EventAlarm
F.EventAction
A.Cable modems only operate at Layer 1 of the OSI model.
B.Cable modems operate at Layers 1 and 2 of the OSI model.
C.Cable modems operate at Layers 1, 2, and 3 of the OSI model.
D.A function of the cable modem termination system (CMTS) is to convert the modulated signal from the cable modem into a digital signal.
E.A function of the cable modem termination system is to convert the digital data stream from the end user host into a modulated RF signal for transmission onto the cable system.
A.Dead Peer Detection (DPD)
B.CDP
C.isakmp keepalives
D.GRE keepalive mechanism
E.The hello mechanism of the routing protocol across the IPsec tunnel
Refer to the exhibit. Which statement is true about the partial MPLS configuration that is shown?()
A.The route-target both 100:2 command sets import and export route-targets for vrf2.
B.The route-target both 100:2 command changes a VPNv4 route to a IPv4 route.
C.The route-target import 100:1 command sets import route-targets routes specified by the route map.
D.The route-target import 100:1 command sets import route-targets for vrf2 that override the other route-target configuration.
Refer to the exhibit. Which statement is true about the configuration of split tunnels using SDM?()
A.Any protected subnets that are entered represent subnets at the end user’s site that will be accessed without going through the encrypted tunnel.
B.Any protected subnets that are entered represent subnets at the end user’s site that will be accessed through the encrypted tunnel.
C.Any protected subnets that are entered represent subnets at the VPN server site that will be accessed without going through the encrypted tunnel.
D.Any protected subnets that are entered represent subnets at the VPN server site that will be accessedthrough the encrypted tunnel.
最新試題
Which three statements about the Cisco Easy VPN feature are true?()
Which statement is true about a worm attack?()
Refer to the exhibit. MPLS has been configured on all routers in the domain. In order for R2 and R3 to forward frames between them with label headers, what additional configuration will be required on devices that are attached to the LAN segment?()
What are three configurable parameters when editing signatures in Security Device Manager (SDM)?()
When configuring the Cisco VPN Client,what action is required prior to installing Mutual Group Authentication?()
Refer to the exhibit. The show mpls interfaces detail command has been used to display information about the interfaces on router R1 that have been configured for label switching. Which statement is true about the MPLS edge router R1?()
Which statement describes the Authentication Proxy feature?()
Refer to the exhibit. What type of security solution will be provided for the inside network?()
Which statement about an IPS is true?()
What is a reason for implementing MPLS in a network?()