Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.
Configure pNAT to ensure Voice over IP packets are properly translated.
Configure IOS firewall to permit RTP port numbers through the firewall via VPN.
Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.
第1题:
An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits?()
A. Implement an intrusion detection system (IDS).
B. Implement a dual-factor authentication method.
C. Implement a patch management process.
D. Implement stronger user passwords.
第2题:
What is a benefit of NTLMSSP over basic authentication?()
第3题:
A.A connection as the user kate was successful
B.A connection failed due to authentication being unsuccessful
C.A connection was attempted via socket rather than TCP
D.A connection was blocked by a firewall or a similar security mechanism
E.A connection failed because the proxy user privileges did not match the login user
第4题:
Which statement describes the Authentication Proxy feature?()
第5题:
You need to design a PKI solution that meets business and security requirements. What should you do?()
第6题:
Which statement about the S-Series native FTP proxy is not true?()
第7题:
What are three features of the Cisco IOS Firewall feature set?()
第8题:
A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
B. Configure the supplicant as anexternal authentication server
C. Configure RADIUS proxy on the realm
D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service
第9题:
You are the network administrator for Company. Company’s network consists of 200 Windows 2000 Professional computers. CompanyW1 is a Windows 2000 Server computer that hosts Company’s intranet site. CompanyP1 is a computer running Microsoft Proxy Server that is used by all computers on the network to access the Internet. You discover that CompanyP1 is experiencing performance degradation due to large number of requests to authenticate with the proxy server. You want to minimize the number of authentication requests to the proxy server. What should you do on each computer?()
第10题:
Which statement about SNMP is true?()