单项选择题
Refer to the exhibit. An enterprise's security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()
A.802.1X authentication
B.authentication proxy
C.Context Based Access Control
D.Lock and Key authentication
相关考题
-
单项选择题
Refer to the exhibit. Available public Internet sites are sometimes used for estimating performance. Which statement regarding their use for estimating VPN performance is correct?()
A.Throughput results are valid as a value from the Teleworker's home to the corporate site, regardless of the location of the public test server.
B.Throughput results may not be valid due to the public server's location on the Internet and fluctuations based on the use of the public server.
C.Throughput values are not affected by the choice of split tunneling or Internet access through the VPN.
D.Throughput results are unrelated to the Teleworker PC configuration or current PC use. -
单项选择题
Whatistheminimumrecommendeduplink/downlinkspeedtosupportasingleencryptedIPvoiceTeleworkercall?()
A.256kbps / 1024kbps
B.256kbps / 1544kbps
C.160kbps / 768kbps
D.384kbps / 384kbps
E.128kbps / 512kbps -
单项选择题
Forbestpacketswitchingperformancewithcrypto,whatistherecommendpacketswitchingpathinaCiscoTeleworkerRouter?()
A.Process Switching
B.Silicon Switching
C.Cisco Express Forwarding (CEF) Switching
D.Autonomous Switching
