单项选择题
An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
A.Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.
B.Configure pNAT to ensure Voice over IP packets are properly translated.
C.Configure IOS firewall to permit RTP port numbers through the firewall via VPN.
D.Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.
相关考题
-
多项选择题
WhenIPTelephonyisdeployedforTeleworkersusingtheCiscoBusinessReadyTeleworkersolution,whichstatementsaretrue?()
A.There is lower bandwidth consumption for VoIP media streams.
B.Teleworkers can have the same extensions and inward-dialing numbers at their office desks and home offices.
C.Personal calls are routed directly through the residential PSTN line.
D.Teleworkers can have different extensions at their office desks and home offices.
E.There is less burden on Cisco CallManager for signaling traffic.
F.Incoming calls are first routed to the office desks, then to the home offices. -
多项选择题
WhatcharacteristicsmakeADSLthelikelychoiceamongDSLtechnologiesforTeleworker?()
A.most widely deployed by service providers
B.provides asymmetrical bandwidth, including high speed downlink
C.data rate is affected by distance to the Central Office
D.provides the furthest reach at T1 speeds
E.supports connection of two routers without the use of a DSL access concentrator -
单项选择题
WhenisanIPSecSAbuiltontheTeleworkerRouter?()
A.when the router is booted up
B.when the router administratively does a no shutdown" on the IPSec SA
C.when traffic matches a line of the access-list tied into the crypto-map in the router configuration, and that particular IPSec SA is not already up
D.when the ISAKMP SA completes negotiation of all IPSec SAs (one per access-list line in the crypto ACL), it will be brought up immediately
