niusouti.com
更多“Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?() ”相关问题
  • 第1题:

    Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()

    A. ARP

    B. SSH

    C. Telnet

    D. WEP

    E. SNMPv1

    F. SNMPv2


    参考答案:B

  • 第2题:

    When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? As a Network Engineer, it is necessary for you to know how to implement MPLS VPNs between Customer Edge and Provider Edge routers. Refer to the following descriptions, which one is making sense?()

    • A、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution
    • B、If using IS-IS as the PE-CE routing protocol, no redistribution is required
    • C、If using static routes between the CE and PE routers, no redistribution of other VPN routes is required
    • D、If PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required

    正确答案:D

  • 第3题:

    Which protocol is used by multicast to prevent loops?()

    • A、OSPF
    • B、RIP
    • C、RPF
    • D、BGP
    • E、EIGRP

    正确答案:C

  • 第4题:

    LDAP is being used throughout the Company wireless network.  Which statement about the  Lightweight Access Point Protocol (LWAPP) protocol is true?()

    • A、 The processing of 802.11 data and management protocols and access point capabilities is  distributed between a lightweight access point and a centralized WLAN controller.
    • B、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the  wireless LAN.
    • C、 LWAPP aggregates radio management forward information and sends it to a wireless LAN  solution engine.
    • D、 LWAPP authenticates all access points in the subnet and establishes a secure communication  channel with each of them.
    • E、 None of the other alternatives apply

    正确答案:A

  • 第5题:

    Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()

    • A、ARP
    • B、SSH
    • C、Telnet
    • D、WEP
    • E、SNMPv1
    • F、SNMPv2

    正确答案:B

  • 第6题:

    When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? ()

    • A、If using IS-IS as the PE-CE routing protocol, no redistribution is required.
    • B、If using static routes between the CE and PE routers, no redistribution of other VPN routes is required.
    • C、If the PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required.
    • D、If RIP is the routing protocol that is used between the PE-CE routers, no redistribution is required, but any other protocol will require redistribution.
    • E、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution.

    正确答案:C

  • 第7题:

    Which path selection protocol is used by Fibre Channel fabrics?()

    • A、 IVR
    • B、 VoQ
    • C、 FSPF
    • D、 VSANs
    • E、 SANTap

    正确答案:C

  • 第8题:

    单选题
    Which protocol is an open standard protocol frame work that is commonly used in VPNs,to provid secureend-to-end communication?()
    A

    L2TP

    B

    IPsec

    C

    PPTP

    D

    RSA


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    Which mechanism can you use to achieve sub-second failover for link failure detection when a switched Ethernet media is used and loss of signal is not supported by the link provider?()
    A

    OSPF standard hellos

    B

    Cisco Discovery Protocol link detection

    C

    Bidirectional Forwarding Detection

    D

    Fast Link Pulse

    E

    autonegotiation


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()
    A

    ARP

    B

    SSH

    C

    Telnet

    D

    WEP

    E

    SNMPv1

    F

    SNMPv2


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? As a Network Engineer, it is necessary for you to know how to implement MPLS VPNs between Customer Edge and Provider Edge routers. Refer to the following descriptions, which one is making sense?()
    A

    If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution

    B

    If using IS-IS as the PE-CE routing protocol, no redistribution is required

    C

    If using static routes between the CE and PE routers, no redistribution of other VPN routes is required

    D

    If PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    If you needed to transport traffic coming from multiple VLANs (connected between switches), and  your CTO was insistent on using an open standard,which protocol would you use?()
    A

    802.11B

    B

    spanning-tree

    C

    802.1Q

    D

    ISL

    E

    VTP

    F

    Q.921


    正确答案: E
    解析: 暂无解析

  • 第13题:

    Ethernet is the commonly used local area network communication protocol. The standard of Ethernet is ( ) .

    A.IEEE 802.1
    B.IEEE 802.2
    C.IEEE 802.3
    D.IEEE 802.11

    答案:C
    解析:

  • 第14题:

    Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()

    • A、802.1X
    • B、Cisco Temporal Key Integrity Protocol (CKIP)
    • C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
    • D、Cisco Message Integrity Check (CMIC)
    • E、One-Time Passwords (OTP)
    • F、Advanced Encryption Standard (AES)

    正确答案:B,D

  • 第15题:

    What does the protocol field inside the PPP frame indicate?()

    • A、the protocol used to determine the authentication method
    • B、the protocol used to identify the data in the Information field
    • C、the protocol used to carry the PPP frame
    • D、the protocol used to decode the FCS field
    • E、the protocol used to detect the number of padding bytes

    正确答案:B

  • 第16题:

    If you needed to transport traffic coming from multiple VLANs (connected between switches), and  your CTO was insistent on using an open standard,which protocol would you use?()

    • A、802.11B
    • B、spanning-tree
    • C、802.1Q
    • D、ISL
    • E、VTP
    • F、Q.921

    正确答案:C

  • 第17题:

    Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?()

    • A、L2TP
    • B、IPsec
    • C、PPTP
    • D、RSA

    正确答案:B

  • 第18题:

    For the following protocols, which one provides a mechanism to transparently intercept and redirect CIFS traffic from a client to a local Cisco Wida Area Application engine?()

    • A、Virtual Router Redundancy Protocol(VRRP)
    • B、File Transport Protocol(FTP)
    • C、Hot Standby Routing Protocol(HSRP)
    • D、Web Cache Communication Protocol(WCCP)

    正确答案:D

  • 第19题:

    单选题
    What does the protocol field inside the PPP frame indicate?()
    A

    the protocol used to determine the authentication method

    B

    the protocol used to identify the data in the Information field

    C

    the protocol used to carry the PPP frame

    D

    the protocol used to decode the FCS field

    E

    the protocol used to detect the number of padding bytes


    正确答案: E
    解析: 暂无解析

  • 第20题:

    单选题
    Which protocol is used for communication between the Junos Pulse client and 802.1X-compliant switches when performing Layer 2 enforcement?()
    A

    EAP

    B

    RADIUS

    C

    SSL

    D

    EAP-o-HTTP


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which WAN protocol is used for out-of-band signaling?()
    A

    NCP

    B

    HDLC

    C

    LAPB

    D

    LAPD


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which protocol is used by multicast to prevent loops?()
    A

    OSPF

    B

    RIP

    C

    RPF

    D

    BGP

    E

    EIGRP


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    LDAP is being used throughout the Company wireless network.  Which statement about the  Lightweight Access Point Protocol (LWAPP) protocol is true?()
    A

     The processing of 802.11 data and management protocols and access point capabilities is  distributed between a lightweight access point and a centralized WLAN controller.

    B

     LWAPP advertises its WDS capability and participates in electing the best WDS device for the  wireless LAN.

    C

     LWAPP aggregates radio management forward information and sends it to a wireless LAN  solution engine.

    D

     LWAPP authenticates all access points in the subnet and establishes a secure communication  channel with each of them.

    E

     None of the other alternatives apply


    正确答案: C
    解析: 暂无解析