CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources]

Tebyan

نسخه متنی -صفحه : 290/ 238
نمايش فراداده

  • Chapter 12

    A1:

    c

    A2:

    a,c,d

    A3:

    b

    A4:

    d

    A5:

    a,d

    A6:

    b,c,e

    A7:

    b

    A8:

    a,e

    A9:

    a,c,d

    A10:

    d

    A11:

    a,d,e

    A12:

    b,d,e

    A13:

    b,c,e

    A14:

    b,c,d,e

    Q&A

    1:

    What does AVVID stand for?

    A1:

    Architecture for Voice, Video, and Integrated Data

    2:

    Which two authentication protocols does Cisco Secure ACS use?

    A2:

    RADIUS

    TACACS+

    3:

    Currently, what models are available for the Cisco 3000 Series Concentrator?

    A3:

    3005, 3015, 3030, 3060, and 3080

    4:

    The Cisco ____ and the Cisco ___ Series routers are entry-level VPN-enabled routers.

    A4:

    SOHO

    800

    5:

    What two operating modes are available to the Cisco VPN 3000 Hardware Client?

    A5:

    Client mode

    Network extension mode

    6:

    What does AAA stand for?

    A6:

    Authentication, authorization, and accounting

    7:

    Cisco ___ and ____ are two security management solutions available from Cisco.

    A7:

    VMS, CSPM

    8:

    Name the principle building blocks of the AVVID design.

    A8:

    Network infrastructure

    Service control

    Communications services

    9:

    Identity management can be achieved by using what Cisco product?

    A9:

    Cisco Secure Access Control Server

    10:

    What two types of VPNs are supported by the PIX Firewall?

    A10:

    Site-to-site

    Client-to-site

    11:

    The capability of a Cisco router to support VPN connectivity is determined by what?

    A11:

    Cisco router VPN capability is determined by the version of Cisco IOS software it is running.

    12:

    What is the Cisco VPN 3000 Series Concentrator?

    A12:

    The Cisco VPN 3000 Series Concentrator is a range of purpose-built, remote-access VPN devices that provide high performance, high availability, and scalability while utilizing the most advanced state-of-the-art encryption and authentication techniques that are currently available within the industry.