网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines. What command would assign this access- list to the Virtual Terminal Lines?()
A

router(config-line)# ip access-group 1 in

B

router(config-line)# access-class 1 in

C

router(config-line)# ip access-list 1 in

D

router(config-line)# access-line 1 in


参考答案

参考解析
解析: 暂无解析
更多 “单选题You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines. What command would assign this access- list to the Virtual Terminal Lines?()A router(config-line)# ip access-group 1 inB router(config-line)# access-class 1 inC router(config-line)# ip access-list 1 inD router(config-line)# access-line 1 in” 相关考题
考题 After working all night and successfully configuring a Cisco router for the Ezonexam network you save your changes on the startup config, reboot the router, and go out for a cigarette. When you return, none of your changes are active and the router boots to the initial configuration mode! Which of the choices below indicates the source of your problem?A.Hardware failure in NVRAM prevents the router from loading the configB.Startup-config in flash is corrupt and cannot be analyzedC.Router configuration-register set to bypass startup configurationD.Startup-config in NVRAM is corrupt and cannot be analyzedE.None of the above

考题 You are trying to connect directly into the LAN prot of a Ezonexam router. You want to telnet to the local Cisco router using TCP/IP but cannot create a session.What should you do to resolve the problem?A. Use a straight-through cable to connect your computer's COM port to the router's console port.B. Use a crossover cable to connect your computer's COM port to the router's console port.C. Use a straight-through cable to connect your computer's COM port to the router's Ethernet port.D. Use a crossover cable to connect your computer's Ethernet port to the router's Ethernet port.E. Use a rollover cable to connect your computer's Ethernet port to the router's Ethernet port.F. Use a straight-through cable to connect your computer's Ethernet port to the router's Ethernet port.G. None of the above

考题 You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with the IP protocol stack in your PC. Which of the following actions is most likely to confirm your diagnosis?A. ping 127.0.0.0B. ping 203.125.12.1C. telnet 127.0.0.1D. ping 127.0.0.1E. tracert 203.125.12.1F. None of the above

考题 You are logged into a router and wish to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces?A. show ip linksB. show cdp neighborC. show cdp neighbor detailD. show ip clientsE. show ip routeF. None of the above

考题 You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()A.AB.BC.CD.D

考题 After attempting to telnet into a router, you are denied and you receive the error message "password required, but none set." What configuration changes will allow telnet access into this router?() A.B.C.D.

考题 You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A. show access-listB. show ip access-listC. show ip interfaceD. show interfaceE. show interface list

考题 You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command ip access-group 101 in to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()A. Telnet sessions from host A to host 5.1.1.10B. Telnet sessions from host A to host 5.1.3.10C. Telnet sessions from host B to host 5.1.2.10D. Telnet sessions from host B to host 5.1.3.8E. Telnet sessions from host C to host 5.1.3.10F. Telnet sessions from host F to host 5.1.1.10

考题 You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines.What command would assign this access- list to the Virtual Terminal Lines?()A. router(config-line)# ip access-group 1 inB. router(config-line)# access-class 1 inC. router(config-line)# ip access-list 1 inD. router(config-line)# access-line 1 in

考题 You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

考题 You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?() A.5B.10C.14D.20

考题 You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?()A、5B、10C、14D、20

考题 You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with your protocol stack. Which of the following actions is most likely to confirm your diagnosis?()A、ping 127.0.0.0B、ping 203.125.12.1C、telnet 127.0.0.1D、ping 127.0.0.1E、tracert 203.125.12.1

考题 You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A、show access-listB、show ip access-listC、show ip interfaceD、show interfaceE、show interface list

考题 After working all night and successfully configuring a Cisco router for the TestKing network you save your changes on the startup config, reboot the router, and go out for a cigarette. When you return, none of your changes are active and the router boots to the initial configuration mode! Which of the choices below indicates the source of your problem?()A、Hardware failure in NVRAM prevents the router from loading the configB、Startup-config in flash is corrupt and cannot be analyzedC、Router configuration-register set to bypass startup configurationD、Startup-config in NVRAM is corrupt and cannot be analyzedE、None of the above

考题 You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines. What command would assign this access- list to the Virtual Terminal Lines?()A、router(config-line)# ip access-group 1 inB、router(config-line)# access-class 1 inC、router(config-line)# ip access-list 1 inD、router(config-line)# access-line 1 in

考题 Which Cisco SDM feature allows you to specify whether you want SDM files installed on your PC or on your router?()  A、 Install Shield WizardB、 Cisco SDM Express WizardC、 Cisco SDM Image ManagerD、 Create Connection Wizard

考题 单选题Which of the following Frame-Relay encapsulation commands would you use, if you had to connect your Cisco router to a non-Cisco router?()A TestKRouter(config-if)# Encapsulation frame-relay dot1qB TestKRouter(config-if)# Encapsulation frame-relay aal5snapC TestKRouter(config-if)# Encapsulation frame-relay ietfD TestKRouter(config-if)# Encapsulation frame-relay islE None of the above

考题 单选题After working all night and successfully configuring a Cisco router for the TestKing network you save your changes on the startup config, reboot the router, and go out for a cigarette. When you return, none of your changes are active and the router boots to the initial configuration mode! Which of the choices below indicates the source of your problem?()A Hardware failure in NVRAM prevents the router from loading the configB Startup-config in flash is corrupt and cannot be analyzedC Router configuration-register set to bypass startup configurationD Startup-config in NVRAM is corrupt and cannot be analyzedE None of the above

考题 单选题You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?()A 5B 10C 14D 20

考题 单选题You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with your protocol stack. Which of the following actions is most likely to confirm your diagnosis?()A ping 127.0.0.0B ping 203.125.12.1C telnet 127.0.0.1D ping 127.0.0.1E tracert 203.125.12.1

考题 多选题You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()AAdministratively shut down the interface.BPhysically secure the interface.CCreate an access list and apply it to the virtual terminal interfaces with the access-group command.DConfigure a virtual terminal password and login process.EEnter an access list and apply it to the virtual terminal interfaces using the access-class command.

考题 单选题How can you verify that you have correctly configured SSH access to your Junos device?()A user@router# show system servicesB user@router show configuration servicesC user@router# show configuration system servicesD user@router# show system login

考题 单选题When you access the Cisco CRS Administration page for the first time in a cluster, the system automatically initiates the cluster setup procedure. You perform this procedure one time for a cluster. Whatdo you accomplish in this procedure?()A identify your Cisco CRS license files and location, enter information about your LDAP, and designate a Cisco CRS administrator B identify CSQs and JTAPI user and designate a Cisco CRS administrator C identify resources and RM user and enter information about your LDAP D identify your Cisco CRS license files and location, enter information about your LDAP, and designate IPCC Express resources 

考题 单选题You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A show access-listB show ip access-listC show ip interfaceD show interfaceE show interface list

考题 单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()A Configure the network category of your wireless network connection to Private.B Configure the network category of your wireless network connection to Public.C Configure the TCP/IP packet filtering on the wireless network connection.D Configure the wireless network connection with the appropriate authentication to the router.

考题 单选题Which Cisco SDM feature allows you to specify whether you want SDM files installed on your PC or on your router?()A  Install Shield WizardB  Cisco SDM Express WizardC  Cisco SDM Image ManagerD  Create Connection Wizard