Which description is correct about L2TP VPN and SSL VPN?
Which description is correct about L2TP VPN and SSL VPN?A . All need to install and maintain the clientB . Both support Web accessC . All support lP access modeD . are based on UDP encapsulationView AnswerAnswer: C
Among the packets encapsulated by the GRE protocol, the payload protocol is the IPX protocol, and the bearer protocol is the IP protocol.The encapsulation sequence of the packet from the link layer to the payload data is the link layer ____GRE____ payload data.
Among the packets encapsulated by the GRE protocol, the payload protocol is the IPX protocol, and the bearer protocol is the IP protocol.The encapsulation sequence of the packet from the link layer to the payload data is the link layer ____GRE____ payload data.A . lP , IPXB . IPX , ...
Which of the following statements about SOA and IToIP is correct is ____ .
Which of the following statements about SOA and IToIP is correct is ____ .A . SOA solutions to the requirements of IT infrastructure integration, unified web-based technology to build IT infrastructure platform.B . SOA is based on the network, eliminates the information gap caused by heterogeneous systems, integrates various services...
In the PPPoE negotiation process, which of the following PPPoE messages must contain Service-Name information ?
In the PPPoE negotiation process, which of the following PPPoE messages must contain Service-Name information ?A . PADI ( PPPoE Active Discover Initiation )B . PADO ( PPPoE Active Discover Offer )C . PADR ( PPPoE Active Discover Request )D . PADT ( PPPoE Active Discover Terminate )View AnswerAnswer: ...
Among the control messages defined by the MPCP protocol, the one sent by the OLT is ______ .( Choose one or more )
Among the control messages defined by the MPCP protocol, the one sent by the OLT is ______ .( Choose one or more )A . GATEB . ReportC . Register_ReqD . RegisterE . Register_AckView AnswerAnswer: AD Explanation:
Among the following VPN technologies, those belonging to the third layer VPN are ____ .( Choose one or more )
Among the following VPN technologies, those belonging to the third layer VPN are ____ .( Choose one or more )A . L2TP VPNB . BGP/MPLS VPNC . VLLD . IPSec VPNView AnswerAnswer: BD Explanation: Three layers: IPSEC , GRE , MPLS VPN
In FIG illustrated EPON networking, the OLT to the network all the ONU ( the ONU1 to ONUn ) to transmit data, the following statements is correct is ____ .( Choose one or more )
In FIG illustrated EPON networking, the OLT to the network all the ONU ( the ONU1 to ONUn ) to transmit data, the following statements is correct is ____ .( Choose one or more )A . Line Road 0 have all the ONU dataB . Line Road 1 on which all the ONU dataC . wire passage ...
The following belong to the core layer function is ____ .( Choose one or more )
The following belong to the core layer function is ____ .( Choose one or more )A . owns a large number of interfaces, and for the final connected user computer.B . access into the security controlC . High -speed packet-switchedD . will be the routing policyView AnswerAnswer: CD
The incorrect description of L2TP VPN and GREVPN is ____ .( Choose one or more )
The incorrect description of L2TP VPN and GREVPN is ____ .( Choose one or more )A . all point to point VPNB . Both support tunnel verificationC . Both support dynamic address acquisitionD . are based on UDP encapsulationView AnswerAnswer: ACD
When the link type of the ONU port is Access , its processing method for the upstream message is ____ .
When the link type of the ONU port is Access , its processing method for the upstream message is ____ .A . only allowed without belt tag packets through, and packets add the default VLAN 's tagB . Only the packets with the default VLAN tag are allowed to pass and go to the tagC . for without...