单项选择题
A.Twenty bytes of header will be replaced with five bytes.
B.If the IPSec transform set includes Authentication Header, the receiving IPSec peer will discard the packets.
C.The IPSec packets will be dropped by Router A's compression logic.
D.The voice packets will not be compressed.
多项选择题 WhataretheDSL-specificfactorsthatrequireadditionalbandwidthwhensupportingVoice-over-IPoveranIPSecVPN?()
单项选择题 Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, how can the Service Provider Edge Router identify Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()
单项选择题 Refer to the exhibit. An enterprises security policy disallows the use of wireless on a Teleworker PC. Choose the most appropriate 830 security feature to use to enforce the security policy.()