A client requirement to separate management and control layer within an

A client requirement to separate management and

This preview shows page 12 - 15 out of 67 pages.

QUESTION 27A client requirement to separate management and control layer within an organization. Which technology canbe used to achieve this requirement while minimizing physical devices? A.Virtual Device ContextB. VRFC.Virtual Switching SystemD.Virtual Local Area NetworksE. MECCorrect Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 28An engineer is designing a multitenant network that requires separate management access and must share asingle physical firewall. Which two features support this design? (Choose two)
Image of page 12
/c/en/us/td/docs/security/asa/asa96/configuration/general/asa-96-general-config/ hacontexts.pdf Page 14 of Guidelines for Multiple Context Mode lists unsupported features, after you cross the unsupported features out – you are left with what works on a multi-context mode firewall QUESTION 29Which technology should a network designer combine with VSS to ensure a loop free topology with optimalconvergence time? D QUESTION 30While designing a wide area network, the network team wants to avoid undesired transit traffic through remotebranch sites with multiple WAN connections. Which option can be used to manage traffic flows in the remotenetwork? C Section: (none) Explanation Explanation/Reference: QUESTION 31 What are the true regarding 802.1X? (Choose three) A. Authenticates the user itself B. Authenticates the device itself C. If the device does not support, allow the access automatically D. Cisco proprietary E. Industry standard Correct Answer: ABE Section: (none) Explanation Explanation/Reference: QUESTION 32
Image of page 13
What is one function of key server in Cisco GETVPN deployment? A.sending the RSA certificateB.providing pre-shared keysC.maintaining security policesD.providing the group IDCorrect Answer: Section: (none)ExplanationExplanation/Reference:Comments:Key server is responsible for maintaining security policies, authenticating the GMs and providing the sessionkey for encrypting traffic. KS authenticates the individual GMs at the time of registration. Only after successfulregistration the GMs can participate in group SA.deployment_guide_c07_554713.html C
Image of page 14
Image of page 15

You've reached the end of your free preview.

Want to read all 67 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture