CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





  • Chapter 17



    A1:

    d

    A2:

    b,d

    A3:

    b,c,e

    A4:

    a,c

    A5:

    b,c,d

    A6:

    b

    A7:

    b

    A8:

    b

    A9:

    b

    A10:

    c

    Q&A

    1:

    What workers are considered within the remote-user design model?

    A1:

    Mobile

    Home-office

    2:

    What are the four design options available within the remote-user design model?

    A2:

    Remote-site firewall

    Remote-site router

    VPN hardware client

    Cisco VPN Client

    3:

    What modes can the VPN hardware client operate in?

    A3:

    Client mode

    Network extension mode

    4:

    The Cisco VPN Client uses _____ and ____ types of authentication.

    A4:

    Group, user

    5:

    What are the additional benefits that the remote-site router provides compared to the remote-site firewall option?

    A5:

    Advance router functionality, such as QoS, and the capability to integrate the broadband access device into a single device.

    6:

    What type of filter is used to prevent IP spoofing attacks?

    A6:

    RFC 2827 filtering mitigates IP spoofing attacks.

    7:

    What happens to the security perimeter of an organization when it is using the remote-user design model?

    A7:

    When using the remote-user design model, the security of an organization is extended to include the remote site.

    8:

    What is the difference between the VPN tunnel types: tunnel-everything and split tunnel?

    A8:

    Tunnel-everything
    Only remote-site traffic that is specifically defined will traverse the VPN tunnel; all other traffic follows the appropriate routes.

    Split-tunnel
    All remote-site traffic, whatever the destination, traverses the VPN tunnel.

    9:

    How is the remote-site firewall design option remotely managed?

    A9:

    Remote management of the firewall in the remote-site firewall option uses an IPSec VPN tunnel from the central site that terminates directly onto the firewall.

  • / 290