A.No additional steps are required.
B.Add the appropriate source-interface command.
C.The router cannot access a server in the Enterprise Campus network.
D.The Teleworker Router does not have any client applications; therefore this type of request is not possible.
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit. Given this DSL router's sub-interface configuration, select the two true statements. Assume the interface is UP/UP.()
A.The interface must be configured as point-to-multipoint
B.The sustained cell rate and the burst rate are equal
C.The router's configuration will also include a Dialer interface
D.The configuration must also include a sub-interface with a VPI/VCI of 8/35
Refer to the exhibit. Which statement is true regarding the topology?()
A.An IPSec tunnel cannot be established between Router A and Router B
B.The Linksys Firewall router does not support PPPoE
C.Destination addresses defined in RFC 1918 are not supported within an IPSec tunnel
D.The phone and PC behind Router A will not be able to connect to a host on 192.168.1.0/24
Refer to the exhibit. Easy VPN operates in two modes. The exhibit represents network extension mode. Choose the best reason for using this mode.()
A.Teleworker devices must be accessed from the central site (server, printers).
B.IP addressing is simplified.
C.The Teleworker LAN is a transit networking for routing.
D.The Teleworker router is an MPLS PE node.
A.There is no disadvantage.
B.It will add 16 bytes per packet of overhead(8 bytes UDP header, and 8 bytes of NON-IKE Marker).
C.It will add 36 bytes per packet of overhead (20 bytes of IP header, 8 bytes of UDP header, 8 bytes of NON-IKE Marker).
D.It will require that both crypto peers support this feature in the IOS version. Both crypto peers must also have this feature enabled.
A.access control and billing can be done on a per-user, rather than a per-site basis
B.supports Link Fragmentation and Interleaving
C.provides the ability to connect a network of hosts over a simple bridging access device
D.provides a consistent means of authenticating users (RADIUS for example)
最新試題
Refer to the exhibit. Given the DHCP pool configuration shown on Router A, the Cisco IP phone will not boot up in the Teleworker location. What is missing from the Teleworker DHCP pool configuration?()
A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()
Refer to the exhibit. Given this DSL router's sub-interface configuration, select the two true statements. Assume the interface is UP/UP.()
It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
Which statement regarding 802.1X is true?()
Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()
A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()
An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
Refer to the exhibit. Given the configuration on a Teleworker router, and knowing it was in the process of being booted, what statement would best describe the order in which the head-end peers would be selected?()