Refer to the exhibit. With an IPSec tunnel established betwe

题目
单选题
Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
A

Twenty bytes of header will be replaced with five bytes. 

B

If the IPSec transform set includes Authentication Header, the receiving IPSec peer will discard the packets. 

C

The IPSec packets will be dropped by Router A's compression logic.

D

The voice packets will not be compressed.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Refer to the exhibit. Which interoperability technique implemented on the dual - stack routers would allow connectivity between IPv6 sites across automatic created tunnels using the 2002::/16 prefix? ()

A. Dual Stack

B. NAT - PT

C. 6to4 tunnel

D. GRE tunnel

E. ISATAP tunnel


参考答案:C

第2题:

Refer to the exhibit. On the basis of the configuration provided, how are the Hello packets sent by R2 handled by R5 in OSPF area 5?()

A. The Hello packets will be exchanged and adjacency will be established between routers R2 and R5.

B. The Hello packets will be exchanged but the routers R2 and R5 will become neighbors only.

C. The Hello packets will be dropped and no adjacency will be established between routers R2 and R5.

D. The Hello packets will be dropped but the routers R 2 and R5 will become neighbors.


参考答案:C

第3题:

Click the Exhibit button.[A] establishes an IPsec tunnel with [B]. The NAT device translates the IP address 1.1.1.1 to 2.1.1.1.On which port is the IKE SA established?()

A.TCP 500

B.UDP 500

C.TCP 4500

D.UDP 4500


参考答案:D

第4题:

You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()

  • A、The crypto ACL number
  • B、The IPSEC mode (tunnel or transport)
  • C、The GRE tunnel interface IP address
  • D、The GRE tunnel source interface or IP address, and tunnel destination IP address
  • E、The MTU size of the GRE tunnel interface

正确答案:C,D

第5题:

Refer to the exhibit. What is the most appropriate summarization for these routes?()

A.10.0.0.0/21

B.10.0.0.0/22

C.10.0.0.0/23

D.10.0.0.0/24


参考答案:B

第6题:

Refer to the exhibit. A new TAC engineer came to you for advice. A GRE over IPsec tunnel was configured, but the tunnel is not coming up. W hat did the TAC engineer configure incorrectly?()

A. The crypto isakmp configuration is not correct.

B. The crypto map configuration is not correct.

C. The interface tunnel configuration is not correct.

D. The network configuration is not correct; netw ork 172.16.1.0 is missing.


参考答案:A

第7题:

To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?()

A. IPSec in tunnel mode

B. IPSec in transport mode

C. GRE with IPSec in transport mode

D. GRE with IPSec in tunnel mode


参考答案:C

第8题:

Which statement is true regarding IPsec VPNs?()

A. There are five phases of IKE negotiation.

B. There are two phases of IKE negotiation.

C. IPsec VPN tunnels are not supported on SRX Series devices.

D. IPsec VPNs require a tunnel PIC in SRX Series devices.


参考答案:D

第9题:

Refer to the exhibit. Which value will be configured for Default Gateway of the Local Area Connection?()

A.10.0.0.0

B.10.0.0.254

C.192.223.129.0

D.192.223.129.254


参考答案:B

第10题:

What is not a difference between VPN tunnel authentication and per-user authentication?()

  • A、VPN tunnel authentication is part of the IKE specification. 
  • B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
  • C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
  • D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

正确答案:D

更多相关问题