have the firewall and VPN appliance deployed in parallel
place the VPN in line with the firewall, with the VPN terminating inside the firewall
place the public side of the VPN termination device in the DMZ behind a firewall
place the VPN in line with the firewall, with the VPN terminating outside the firewall
第1题:
A. have the firewall and VPN appliance deployed in parallel
B. place the VPN in line with the firewall, with the VPN terminating inside the firewall
C. place the public side of the VPN termination device in the DMZ behind a firewall
D. place the VPN in line with the firewall, with the VPN terminating outside the firewall
第2题:
When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()
第3题:
A. when the remote VPN peer is behind a NAT device
B. when multiple networks need to be reached across the tunnel
C. when the remote VPN peer is a dialup or remote access client
D. when a dynamic routing protocol such as OSPF is required across the VPN
第4题:
What is the recommended practice when considering VPN termination and firewall placement?()
第5题:
What is the recommended practice regarding UDLD when implementing it in all fiber-optic LAN ports?()
第6题:
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
第7题:
A route-based VPN is required for which scenario? ()
第8题:
You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()
A.A
B.B
C.C
D.D
第9题:
What is the recommended practice regarding UDLD when implementing it in all fiber-optic LANports?()
第10题:
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()