{"id":2043,"date":"2010-03-30T09:27:02","date_gmt":"2010-03-30T01:27:02","guid":{"rendered":"http:\/\/www.killtest.com.tw\/?p=2043"},"modified":"2010-06-01T09:20:16","modified_gmt":"2010-06-01T01:20:16","slug":"cisco-ccnp-642-825","status":"publish","type":"post","link":"https:\/\/www.killtest.com.tw\/?p=2043","title":{"rendered":"Cisco CCNP 642-825\u7c21\u4ecb"},"content":{"rendered":"<p><a href=\"http:\/\/www.killtest.net\/CCNP\/\" target=\"_blank\">CCNP<\/a>:ONT (Optimizing Converged Cisco Networks)\uff0c\u57282010\u5e744\u670826\u65e5\u524d\u9810\u7d04\u904e\u820a\u7248\u7684NP\u8003\u8a66\u7684\u9700\u8981\u57282010\u5e747\u670831\u65e5\u524d\u8003\u6389\uff0c\u5167\u5bb9\u5305\u62ec\uff1a\u63cf\u8ff0\u57fa\u672c\u7684 VoIP \u7db2\u7d61\u7684\u5be6\u65bd\u5b78\u7fd2\u95dc\u65bc\u64c1\u585e\u7db2\u7d61\u7684\u512a\u5316\u601d\u60f3\uff1b\u5b78\u7fd2\u5be6\u65bd\u96c6\u6210\u7684 QoS \u670d\u52d9\u7279\u6027\uff1b\u5b78\u7fd2\u5be6\u65bd QoS \u7684\u81ea\u52d5\u914d\u7f6e\uff1b\u5b78\u7fd2\u512a\u5316 WLAN \u7684\u7ba1\u7406\u548c\u5b89\u5168\u3002\u76ee\u524d\u8003\u53d6\u6700\u65b0CCNP\u6709\u5169\u7a2e\u65b9\u6848\uff1a\u65b9\u68481:640-901 + 642-812 + <a href=\"http:\/\/www.killtest.net\/CCNP\/642-825.asp\" target=\"_blank\">642-825<\/a> + 642-845\uff1b\u65b9\u68482:642-892 + 642-825 + 642-845\u3002CCNP \u6301\u6709\u8005\u6709\u5b89\u88dd\u548c\u914d\u7f6e 100 \u5230 500 \u500b\u6216\u8005\u66f4\u591a\u7bc0\u9ede\u7684\u7db2\u7d61\u548c\u6392\u67e5\u6545\u969c\u7684\u80fd\u529b\uff1b\u80fd\u5920\u7ba1\u7406\u6838\u5fc3\u7db2\u7d61\u7684\u904b\u4f5c\uff0c\u4ee5\u53ca\u7d9c\u5408\u61c9\u7528\u7db2\u7d61\u908a\u7de3\u7684\u96c6\u6210\u8a9e\u97f3\uff0c\u7121\u7dda\u4ee5\u53ca\u5b89\u5168\u65b9\u9762\u7684\u5167\u5bb9\u3002<\/p>\n<p>7. Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site<br \/>\nVPNs? (Choose three.)<br \/>\nA. allows dynamic routing over the tunnel<br \/>\nB. supports multi-protocol (non-IP) traffic over the tunnel<br \/>\nC. reduces IPsec headers overhead since tunnel mode is used<br \/>\nD. simplifies the ACL used in the crypto map<br \/>\nE. uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration<br \/>\nAnswer: ABD<br \/>\n8. Which three IPsec VPN statements are true? (Choose three.)<br \/>\nA. IKE keepalives are unidirectional and sent every ten seconds.<br \/>\nB. IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers.<br \/>\nC. IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH) protocol for<br \/>\nexchanging keys.<br \/>\nD. Main mode is the method used for the IKE phase two security association negotiations.<br \/>\nE. Quick mode is the method used for the IKE phase one security association negotiations.<br \/>\nF. To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only three packets.<br \/>\nAnswer: ABF<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CCNP:ONT (Optimizing Converged Cisco Networks)\uff0c\u57282010\u5e744\u670826\u65e5\u524d\u9810\u7d04\u904e\u820a\u7248\u7684NP\u8003\u8a66\u7684\u9700\u8981\u57282010\u5e747\u670831\u65e5\u524d\u8003\u6389\uff0c\u5167\u5bb9\u5305\u62ec\uff1a\u63cf\u8ff0\u57fa\u672c\u7684 VoIP \u7db2\u7d61\u7684\u5be6\u65bd\u5b78\u7fd2\u95dc\u65bc\u64c1\u585e\u7db2\u7d61\u7684\u512a\u5316\u601d\u60f3\uff1b\u5b78\u7fd2\u5be6\u65bd\u96c6\u6210\u7684 QoS \u670d\u52d9\u7279\u6027\uff1b\u5b78\u7fd2\u5be6\u65bd QoS \u7684\u81ea\u52d5\u914d\u7f6e\uff1b\u5b78\u7fd2\u512a\u5316 WLAN \u7684\u7ba1\u7406\u548c\u5b89\u5168\u3002\u76ee\u524d\u8003\u53d6\u6700\u65b0CCNP\u6709\u5169\u7a2e\u65b9\u6848\uff1a\u65b9\u68481:640-901 + 642-812 + 642-825 + 642-845\uff1b\u65b9\u68482:642-892 + 642-825 + 642-845\u3002CCNP \u6301\u6709\u8005\u6709\u5b89\u88dd\u548c\u914d\u7f6e 100 \u5230 500 \u500b\u6216\u8005\u66f4\u591a\u7bc0\u9ede\u7684\u7db2\u7d61\u548c\u6392\u67e5\u6545\u969c\u7684\u80fd\u529b\uff1b\u80fd\u5920\u7ba1\u7406\u6838\u5fc3\u7db2\u7d61\u7684\u904b\u4f5c\uff0c\u4ee5\u53ca\u7d9c\u5408\u61c9\u7528\u7db2\u7d61\u908a\u7de3\u7684\u96c6\u6210\u8a9e\u97f3\uff0c\u7121\u7dda\u4ee5\u53ca\u5b89\u5168\u65b9\u9762\u7684\u5167\u5bb9\u3002 7. Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site VPNs? (Choose three.) A. allows dynamic routing over the tunnel [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[364],"tags":[217,19],"class_list":["post-2043","post","type-post","status-publish","format-standard","hentry","category-ccnp-cisco","tag-642-825","tag-ccnp"],"_links":{"self":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/2043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2043"}],"version-history":[{"count":3,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/2043\/revisions"}],"predecessor-version":[{"id":2198,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/2043\/revisions\/2198"}],"wp:attachment":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}