网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two statements apply to dynamic access lists?()
A

they offer simpler management in large internetworks.

B

you can control logging messages.

C

they allow packets to be filtered based on upper-layer session information.

D

you can set a time-based security policy.

E

they provide a level of security against spoofing.

F

they are used to authenticate individual users


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two statements apply to dynamic access lists?()Athey offer simpler management in large internetworks.Byou can control logging messages.Cthey allow packets to be filtered based on upper-layer session information.Dyou can set a time-based security policy.Ethey provide a level of security against spoofing.Fthey are used to authenticate individual users” 相关考题
考题 Which two statements are correct concerning DHCP Internal Server and DHCP External Server in the E-series router? ()(Choose two.) A. They provide dynamic IP addresses for DSIs.B. They provide dynamic IP addresses for SRC applications.C. They provide dynamic IP addresses from pools for PPPoE subscribers.D. They provide dynamic IP addresses from pools for Routed IP subscribers.

考题 Which of the following answer choices are correct characteristics of named access list?() A. You can delete individual statements in a named access listB. Named access lists require a numbered range from 1000 to 1099.C. Named access lists must be specified as standard or extended.D. You can use the ip access-list command to create named access lists.E. You cannot delete individual statements in a named access list.F. You can use the ip name-group command to apply named access lists.

考题 Which statement about access lists that are applied to an interface is true?() A.you can apply multiple access lists with the same protocol or in different…B.you can config one access list,per direction,per layer 3 protocolC.you can placeasmanyaccess lists as you want on any interfaceD.you can apply ony one access list on any interface

考题 Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。 A.It specifies use of a static encryption key that must be changed frequently to enhance securityB.It requires use of an open authentication methodC.It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD.It requires that all access points and wireless devices use the same encryption keyE.It includes authentication by PSK

考题 Which configuration option will cause the link between two Cisco 3600 Series Multiservice Platforms to become a functional trunk?()A、switchport dynamic auto switchport dynamic autoB、switchport access vlan 10 switchport mode dynamic desireableC、switchport mode trunk switchport nonegotiateD、Leave both ports with the default trunk settings

考题 Which two of these statements best describe the benefits of WPAv2? (Choose two.)()A、 SSID broadcast preventionB、 man-in-the-middle attack protectionC、 cost reduction through software upgrades in all existing hardwareD、 dynamic key generationE、 RF jamming prevention

考题 Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()A、It is used in multihome network scenarios.B、It can be used with BGP to mitigate DoS and DDoS.C、It does not need to have CEF enabled.D、It is enabled via the interface level command ip verify unicast reverse-path.E、It cannot be used with "classification" access lists.

考题 Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()A、Application of up to three access lists per protocol to a single interface.B、No more than two access lists per interface.C、One access list may be configured per direction for each Layer 3 protocol configured on an interface.D、The maximum number allowed varies due to RAM availability in the router.E、An infinite number of access lists that can be applied to an interface, from most specific to most general.F、Cisco IOS allows only one access list to an interface.

考题 Which two statements apply to dynamic access lists?()A、they offer simpler management in large internetworks.B、you can control logging messages.C、they allow packets to be filtered based on upper-layer session information.D、you can set a time-based security policy.E、they provide a level of security against spoofing.F、they are used to authenticate individual users

考题 What are two step needed to define a QoS policy for a traffic class?()A、determine a minimum bandwidth guaranteeB、determine interfaces to which to apply policyC、assign priorities to the classD、configure access control lists

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 Which two statements are correct concerning DHCP Internal Server and DHCP External Server in the E-series router? ()(Choose two.)A、They provide dynamic IP addresses for DSIs.B、They provide dynamic IP addresses for SRC applications.C、They provide dynamic IP addresses from pools for PPPoE subscribers.D、They provide dynamic IP addresses from pools for Routed IP subscribers.

考题 Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 What are two steps needed to define a QoS policy for a traffic class?()A、 Determine a minimum bandwidth guarantee.B、 Determine interfaces to which to apply policy.C、 Assign priorities to the class.D、 Configure access control lists.

考题 Which two statements about static NAT translations are true?()A、They are always present in the NAT table.B、They allow connection to be initiated from the outside.C、They can be configured with access lists, to allow two or more connections to be initiated from the outside.D、They require no inside or outside interface markings because addresses are statically defined.

考题 Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different…B、you can config one access list,per direction,per layer 3 protocolC、you can place as many access lists as you want on any interfaceD、you can apply ony one access list on any interface

考题 单选题Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()A Application of up to three access lists per protocol to a single interface.B No more than two access lists per interface.C One access list may be configured per direction for each Layer 3 protocol configured on an interface.D The maximum number allowed varies due to RAM availability in the router.E An infinite number of access lists that can be applied to an interface, from most specific to most general.F Cisco IOS allows only one access list to an interface.

考题 多选题Which two statements are correct concerning DHCP Internal Server and DHCP External Server in the E-series router? ()(Choose two.)AThey provide dynamic IP addresses for DSIs.BThey provide dynamic IP addresses for SRC applications.CThey provide dynamic IP addresses from pools for PPPoE subscribers.DThey provide dynamic IP addresses from pools for Routed IP subscribers.

考题 多选题Which two statements apply to dynamic access lists?()Athey offer simpler management in large internetworks.Byou can control logging messages.Cthey allow packets to be filtered based on upper-layer session information.Dyou can set a time-based security policy.Ethey provide a level of security against spoofing.Fthey are used to authenticate individual users.

考题 单选题Which statement about access lists that are applied to an interface is true?()A you can apply multiple access lists with the same protocol or in different…B you can config one access list,per direction,per layer 3 protocolC you can placeasmanyaccess lists as you want on any interfaceD you can apply ony one access list on any interface

考题 多选题Which two statements are correct concerning DHCP Internal Server in the E-series router?()AProvide dynamic IPaddressesforDSIs.BProvide connectivity to DHCP servers on other subnetworks.CProvide dynamic IP addresses for SRC applications.DProvide dynamic IP addresses from pools used for PPPoE subscribers.

考题 单选题Which statement about access lists that are applied to an interface is true?()A you can apply multiple access lists with the same protocol or in different direction.B you can config one access list,per direction,per layer 3 protocolC you can place as many access lists as you want on any interfaceD you can apply only one access list on any interface

考题 多选题Which of the following answer choices are correct characteristics of named access list?()AYou can delete individual statements in a named access listBNamed access lists require a numbered range from 1000 to 1099.CNamed access lists must be specified as standard or extended.DYou can use the ip access-list command to create named access lists.EYou cannot delete individual statements in a named access list.FYou can use the ip name-group command to apply named access lists.

考题 多选题Which two statements about static NAT translations are true?()AThey are always present in the NATt able.BThey allow connection to be initiated from the outside.CThey can be configured with access lists,to allow two or more connections to be initiated from the outside.DThey require no inside or outside interface markings because addresses are statically defined.