A.DSL with 128k uplink /128k downlink
B.cable with 256k uplink /256k downlink
C.DSL with 128k uplink /768k downlink
D.cable with 256k uplink /1.4M downlink
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. Given the topology shown, what are two ways to allow the VPN to operate?()
A.Use route maps on the 831
B.The 831 has IPSec NAT-Transparency (NAT-T) enabled
C.Disallow split tunneling on the 831
D.IPSec pass-through must be enabled on the Linksys
E.Use the port-mapping feature on the residential router
A.A voice packet is sent via multiple fixed-length cells; a portion of the last cell is padding, requiring more bandwidth.
B.ADSL typically uses PPPoE encapsulation, which adds additional overhead to each voice packet.
C.A voice packet is sent via multiple fixed-length cells; each cell has about 10% Layer-2 header overhead.
D.IPSec requires additional overhead for the header and hash.
E.ADSL carrier band requires additional bits to be carried over the wire to the DSL Access Concentrator.
A.access control and billing can be done on a per-user, rather than a per-site basis
B.supports Link Fragmentation and Interleaving
C.provides the ability to connect a network of hosts over a simple bridging access device
D.provides a consistent means of authenticating users (RADIUS for example)
Refer to the exhibit. Which statement is true regarding the topology?()
A.An IPSec tunnel cannot be established between Router A and Router B
B.The Linksys Firewall router does not support PPPoE
C.Destination addresses defined in RFC 1918 are not supported within an IPSec tunnel
D.The phone and PC behind Router A will not be able to connect to a host on 192.168.1.0/24
A.802.1X is simple to implement on any workstation.
B.802.1X requires access-lists to allow IP voice traffic across.
C.Authentication is initiated when the workstation connects to an Ethernet port.
D.802.1X requires HTTP access to initiate authentication.
A.most widely deployed by service providers
B.provides asymmetrical bandwidth, including high speed downlink
C.data rate is affected by distance to the Central Office
D.provides the furthest reach at T1 speeds
E.supports connection of two routers without the use of a DSL access concentrator
A.uplink speed less than 768kbps
B.supporting Voice-over-IP
C.using PPPoE encapsulation
D.using PPPoA encapsulation
E.uplink speed greater than 768kbps
A.No additional steps are required.
B.Add the appropriate source-interface command.
C.The router cannot access a server in the Enterprise Campus network.
D.The Teleworker Router does not have any client applications; therefore this type of request is not possible.
A.Authentication Proxy
B.802.1X
C.Context-Based Access Control
D.Intrusion Detection System
E.Stateful firewall
A.Remark the traffic on ingress and prioritize on egress.
B.Enable CEF and Netflow.
C.Configure the MS-Windows QoS Scheduler to prioritize this traffic.
D.Enable WRED.
最新試題
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
What are disadvantages of Network Address Translation Transparency?()
Refer to the exhibit. Given the CPE deployment model, the Enterprise applications shown, and the functions being provided as designated, the appropriate product choice is ____.()
A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()
In a Teleworker deployment with a single IP phone connected to a Cisco 831 router, select the true statement regarding Call Admission Control.()
What characteristics make ADSL the likely choice among DSL technologies for Teleworker?()
Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()
Refer to the exhibit. Easy VPN operates in two modes. The exhibit represents network extension mode. Choose the best reason for using this mode.()
Refer to the exhibit. Given this deployment model, what capability must the Broadband Router provide for the Enterprise applications to function properly?()
When is an IPSec SA built on the Teleworker Router?()