A. RADIUS or LDAP
B. an internal router running EIGRP
C. Reverse Route Injection and OSPF or RIPv2
D. the VPN appliance to be deployed in line with the firewall
您可能感興趣的試卷
你可能感興趣的試題
A. high scalability
B. the design supports a layered security model
C. firewall addressing does not need to change
D. IPsec decrypted traffic is inspected by the firewall
E. there is a centralized point for logging and content inspection
A. to ensure a loop-free topology
B. to protect against user-side loops
C. when a VLAN spans access layer switches
D. for the most deterministic and highly available network topology
E. because of the risk of lost connectivity without Spanning Tree Protocol
A. fewer devices to manage
B. moderate-to-high scalability
C. stateful inspection of decrypted VPN traffic
D. increased bandwidth with additional interfaces
E. decreased complexity as traffic is filtered from the firewall
A. Easy VPN
B. GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
E. Group Encrypted Transport VPN
A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.
最新試題
Which three of the following descriptions are true about the firewall modes? ()
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()
What is the recommended radius of a cell for a voice-ready wireless network?()
Which two statements about an interface configured with the asr-group command are correct? ()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Which path selection protocol is used by Fibre Channel fabrics?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
What are two characteristics of OER? ()
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
Which three mechanisms are used to secure management traffic from outside IPS sensors?()