网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which of the following is a correct IP ACL? (Select TWO)()
A

PERMIT 192.268.20.1

B

DROP 00-12-34-56-78-9A

C

DENYO:::0:::0:::3

D

DENY ANY ANY

E

PERMIT 192.168 1.100 80


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which of the following is a correct IP ACL? (Select TWO)()APERMIT 192.268.20.1BDROP 00-12-34-56-78-9ACDENYO:::0:::0:::3DDENY ANY ANYEPERMIT 192.168 1.100 80” 相关考题
考题 ● Your team has prepared a CPM schedule for your review. You notice that one node has six inputs (including two dummy activities) and four outputs (which include one dummy activity). Select the correct statement from the following:A This is a valid representation if the logic is correct.B This is invalid because a node can have a maximum of one dummy input representation if the logic is correct.C This is invalid because nodes cannot have both dummy inputs and dummy outputs.D This is a invalid because the number of outputs must equal the number of inputs.E This is invalid because a maximum of two inputs and two outputs are allowed using the critical path method.

考题 An administrator is troubleshooting a communication issue between two computers on the sameLayer 2 switch.Which of the following is the BEST way to determine if the switch is causing the issue?() A. Setup an ACL that allows and logs all IP traffic between the two computersB. Configure a spanning tree to check for a loopC. Setup a span port on the switch to watch for CRC errorsD. Connect both computers using a crossover cable

考题 Which of the following is a correct IP ACL? (Select TWO)() A. PERMIT 192.268.20.1B. DROP 00-12-34-56-78-9AC. DENYO:::0:::0:::3D. DENY ANY ANYE. PERMIT 192.168 1.100 80

考题 Which of the following IP addresses is a private IP address? Select all that apply.() A.12.0.0.1B.168.172.19.39C.172.20.14.36D.172.33.194.30E.192.168.42.34

考题 Which of the following descriptions about IP spoofing is correct?()A、IP source address is forgedB、IP destination address is forgedC、IP TCP source port is forgedD、IP TCP destination port is forgedE、None of above

考题 Which of the following routing protocols are unable to advertise CIDR networks?() (Select TWO)A、OSPFB、RIPC、EIGRPD、IGRPE、RIPv2

考题 Which of the following is the correct configuration for a RAID 5 array?()A、A two disk set with one data stripB、A three disk set with two data strips and a parity stripC、A two disk set with two data stripsD、A four disk set with two sets of data strips

考题 Which of the following should be configured on a wireless router to enhance security? (Select TWO).()A、Disable DHCPB、Change wireless channelC、Disable SSID broadcastingD、Change the default username and passwordE、Use a static IP address

考题 Which of the following is a correct IP ACL? (Select TWO)()A、PERMIT 192.268.20.1B、DROP 00-12-34-56-78-9AC、DENYO:::0:::0:::3D、DENY ANY ANYE、PERMIT 192.168 1.100 80

考题 Which of the following are associated with the application layer of the OSI model?(two.)()A、pingB、TelnetC、FTPD、TCPE、IP

考题 Router R1 refers to route - map fred when redistributing from EIGRP into OSPF. The entire route - map is listed next. Which of the following answers must be true based on the configuration as shown?() route - map fred deny 10 match ip address one route - map fred deny 20 match ip address two route - map fred permit 100A、The third route map clause will allow any routes not already filtered by the first two clausesB、R outes permitted by ACL "two" will be redistributedC、Routes denied by ACL "one" will be redistributedD、All routes will be filtereD

考题 Which two of these are correct regarding access control lists? (Choose two.)  ()A、 An ACL can be applied to multiple interlaces.B、 An ACL wildcard mask is identical to an IP subnet mask.C、 There may be multiple ACLs per protocol, per direction, and per interface.D、 There is an "implicit deny" at the end of an ACL and will result in a dropped packet.E、 An ACL acts on all packets, those flowing thru the router and those originated by the router itself.F、 An ACL will be processed from top to bottom and may have multiple matches that will act on the packet that is being tested.

考题 Which of the following network topologies BEST describes a VPN? ()(Select TWO)A、Point to PointB、Point to MultipointC、VLAND、RingE、Bus

考题 Which of the following will allow Karen, a technician, to determine if the correct voltages are reaching the computer components? (Select TWO).()A、Power supply testerB、Cable testerC、Loopback plugsD、MultimeterE、Butt set

考题 Which of the following are encrypted protocols? ()(Select TWO).A、TELNETB、SSHC、POP3D、FTPE、HTTPS

考题 Which of the following are correct sockets for an Intel Core IX series processor?() (Select TWO).A、478B、775C、1156D、1366E、AM2F、AM3

考题 Which of the following commands provides similar information about the current configuration ofactive local Ethernet adapters? (Select TWO)()A、tracerouteB、ipconfigC、ifconfigD、routeE、hostname

考题 Which of the following are common VPN transports? (Select TWO)()A、RDPB、VNCC、SSLD、PPTPE、RAS

考题 多选题Which of the following commands provides similar information about the current configuration ofactive local Ethernet adapters? (Select TWO)()AtracerouteBipconfigCifconfigDrouteEhostname

考题 多选题Which of the following are correct sockets for an Intel Core IX series processor?() (Select TWO).A478B775C1156D1366EAM2FAM3

考题 多选题Which of the following is a correct IP ACL? (Select TWO)()APERMIT 192.268.20.1BDROP 00-12-34-56-78-9ACDENYO:::0:::0:::3DDENY ANY ANYEPERMIT 192.168 1.100 80

考题 单选题An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()A Setup an ACL that allows and logs all IP traffic between the two computersB Configure a spanning tree to check for a loopC Setup a span port on the switch to watch for CRC errorsD Connect both computers using a crossover cable

考题 多选题Which of the following will allow Karen, a technician, to determine if the correct voltages are reaching the computer components? (Select TWO).()APower supply testerBCable testerCLoopback plugsDMultimeterEButt set

考题 多选题Which of the following are encrypted protocols? ()(Select TWO).ATELNETBSSHCPOP3DFTPEHTTPS

考题 多选题PPTP is a combination of which of the following protocols? (Select TWO).()APPPBTCP/IPCTCPDPOP3EPPPoE

考题 多选题Which of the following are common VPN transports? (Select TWO)()ARDPBVNCCSSLDPPTPERAS

考题 多选题Which of the following should be configured on a wireless router to enhance security? (Select TWO).()ADisable DHCPBChange wireless channelCDisable SSID broadcastingDChange the default username and passwordEUse a static IP address

考题 多选题Which two of these are correct regarding access control lists? (Choose two.)  ()AAn ACL can be applied to multiple interlaces.BAn ACL wildcard mask is identical to an IP subnet mask.CThere may be multiple ACLs per protocol, per direction, and per interface.DThere is an implicit deny at the end of an ACL and will result in a dropped packet.EAn ACL acts on all packets, those flowing thru the router and those originated by the router itself.FAn ACL will be processed from top to bottom and may have multiple matches that will act on the packet that is being tested.