A. fewer devices to manage
B. moderate-to-high scalability
C. stateful inspection of decrypted VPN traffic
D. increased bandwidth with additional interfaces
E. decreased complexity as traffic is filtered from the firewall
您可能感興趣的試卷
你可能感興趣的試題
A. high scalability
B. the design supports a layered security model
C. firewall addressing does not need to change
D. IPsec decrypted traffic is inspected by the firewall
E. there is a centralized point for logging and content inspection
A. RADIUS or LDAP
B. an internal router running EIGRP
C. Reverse Route Injection and OSPF or RIPv2
D. the VPN appliance to be deployed in line with the firewall
A. have the firewall and VPN appliance deployed in parallel
B. place the VPN in line with the firewall, with the VPN terminating inside the firewall
C. place the public side of the VPN termination device in the DMZ behind a firewall
D. place the VPN in line with the firewall, with the VPN terminating outside the firewall
A. Thin Model
B. Thick Client
C. Port Forwarding
D. Clientless Access
E. Layer 3 Network Access
A. Layer 2
B. Layer 3
C. in-band
D. out-of-band
E. edge
F. central
最新試題
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()
What is the recommended radius of a cell for a voice-ready wireless network?()
Which technology allows centralized storage services to be shared across different VSANs?()
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()
Which signal and noise values will result in the best phone communication with an access point?()