网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()

  • A、The traffic is dropped
  • B、The resulting action is determined by the destination IP address
  • C、The source IP address is checked,and,if a match is not found, traffic is routed out interface Serial 1
  • D、The resulting action is determined by the destination IP address and port number

参考答案

更多 “A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()A、The traffic is droppedB、The resulting action is determined by the destination IP addressC、The source IP address is checked,and,if a match is not found, traffic is routed out interface Serial 1D、The resulting action is determined by the destination IP address and port number” 相关考题
考题 Cisco路由器执行show access-list命令显示如下一组信息 Standard IP access list block deny 10.0.0.0, wildcardbits 0.255.255.255 log deny 172.16.0.0, wildcard bits 0.15.255.255 permit any 根据上述信息,正确的access-list配置是A.Router (config) #access-list standard block Router (config-std-nacl) #deny 10.0.0.0 255.0.0.0 log Router (config-std-nacl) #deny 172.16.0.0 255.240.0.0 Router (config-std-nacl) #permit anyB.Router (config) #ip access-list standard block Router (config-std-nacl) #permit any Router (config-std-nacl) #deny 10.0.0.0 0.255.255.255 log Router (config-std-nacl) #deny 172.16.0.0 0.15.255.255C.Router (config) #ip access-list standard block Router (config-std-nacl) #deny 10.0.0.0 255.0.0.0 log Router (config-std-nacl) #deny 172.16.0.0 255.240.0.0 Router (config-std-nacl) #permit anyD.Router (config) #ip access-list standard block Router (config-std-nacl) #deny 10.0.0.0 0.255.255.255 log Router (config-std-nacl) #deny 172.16.0.0 0.15.255.255 Router (config-std-nacl) #permit any

考题 Cisco路由器执行show access-list命令显示如下一组控制列表信息:Standard IP acceSS list 30deny 127.0.0.0,wildcard bits 0.255.255.255deny 172.16.0.0,wiidcard bits 0.15.255.255permft any根据上述信息,正确的access-list配置是______。A) Router(config)#access-list 30 deny 127.0.0.0 255.255.255.0Router(config)#access-list 30 deny 172.16.0.0 255.240.0.0Router(config)#access-list 30 permit anyB) Router(config-std-nacl)#access-list 30 deny 127.0.0.0 0.255.255.255Router(config-std-nael)#access-list 30 deny 172.16.0.0 0.15.255.255Router(config-std-nacl)#access-list 30 permit anyC) Router(config)#access-list 30 deny 127.0.0.0 0.255.255.255Router(config)#access-list 30 deny 172.16.0.0 0.15.255.255Router(config)#access-list 30 permit anyD) Router(config)#access-list 30 deny 127.0.0.0 0.255.255.255Router(config)#access-list 30 permit anyRouter(config)#access-list 30 deny 172.16.0.0 0.15.255.255A.B.C.D.

考题 A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?() A. The source and destination addressesB. The destination port numberC. The destination addressD. The source addressE. All of the above

考题 Which of the following answer choices are correct characteristics of named access list?() A. You can delete individual statements in a named access listB. Named access lists require a numbered range from 1000 to 1099.C. Named access lists must be specified as standard or extended.D. You can use the ip access-list command to create named access lists.E. You cannot delete individual statements in a named access list.F. You can use the ip name-group command to apply named access lists.

考题 On which options are standard access list based?() A. source address and subnet maskB. destination address and wildcard maskC. source address and wildcard maskD. destination address and subnet mask

考题 Which item represents the standard IPACL?() A.access-list 50 deny 192.168.1.10.0.0.255B.access-list 110 permit ip any anyC.access-list 2500 deny tcp any host 192.168.1.1 eq22D.access-list 101 deny tcp any host 192.168.1.1

考题 请问用于过滤只接收指定路由器发送的路由信息的命令组合是() A. ip ip-prefix prefix-list-nameB. ip access-list \{standard | extended} access-list nameC. filter-policy gateway prefix-list-name importD. filter-policy gateway access-list-name import

考题 Which of the following are characteristics of named access lists?()A、Individual statements in a named access list may be deleted.B、They require a numbered range from 1000 to 1099.C、When created, they must be specified as standard or extended.D、They are created with the ip access-list command.E、The entire access list must be deleted before editing.F、They are applied with the ip name-group command.

考题 Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()A、both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)B、both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementationC、WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devicesD、WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryptionE、WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

考题 A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()A、The source and destination addressesB、The destination port numberC、The destination addressD、The source addressE、All of the above

考题 What are two roles of the authenticator as described in the 802.1X standard? ()A、It proxies the authentication information between the supplicant and the authentication server.B、It controls physical access to the network.C、It communicates with the authentication server only.D、It is responsible for verifying the identity of the supplicant through the use of an internal database.

考题 创建一个标准命名访问控制列表cisco用来拒绝网络192.168.160.0到192.168.191.0内的主机,下面表达式正确的是()。A、ip access-list standard cisco deny 192.168.160.0 255.255.240.0B、ip access-list standard cisco deny 192.168.160.0 0.0.191.255C、ip access-list standard cisco deny 192.168.160.0 0.0.31.255D、ip access-list standard cisco deny 192.168.0.0 0.0.31.255

考题 Which two statements about the implementation of WLAN QoS are true?()A、The 802.11e standard is the IEEE 802.11 OoS WLAN standard.B、The Wi-Fi Multimedia (WMM) standard decreases the eight priority levels to four access categories.C、The Wi-Fi Multimedia (WMM) standard is a Wi-Fi Alliance standard that increases the four priority levels to eight access categories.D、The Wi-Fi Multimedia (WMM) standard is an IEEE standard that increases the four priority levels to eight access categories.E、Wireless 802.11 deploys Distributed Coordination Function (DCF), carrier sense multiple access with collision detection (CSMA/CD), interframe spacing, and random wait timers to avoid collisions.F、Wireless OoS designs and implementations commonly use Layer 3 differentiated services code point (DSCP) or Layer 2 802.1 p to ensure priority

考题 Which item represents the standard IP ACL?()A、access-list 50 deny 192.168.1.1 0.0.0.255B、access-list 110 permit ip any anyC、access-list 2500 deny tcp any host 192.168.1.1 eq 22D、access-list 101 deny tcp any host 192.168.1.1

考题 On which options are standard access list based?()A、source address and subnet maskB、destination address and wildcard maskC、source address and wildcard maskD、destination address and subnet mask

考题 Which item represents the standard IP ACL?()A、access-list 50 deny 192.168.1.10.0.0.255B、access-list 110 permitip any anyC、access-list 2500 deny tcp any host 192.168.1.1eq22D、access-list 101 deny tcp any host 192.168.1.1

考题 Which two statements about the Wi-Fi Multimedia (WMM) standard are true?()A、 Lower-priority traffic is assigned short interframe wait-timers to allow higher-priority traffic access to the wireless network first.B、 Packets that are not assigned to a specific access category are categorized by default as the background access category.C、 The WMM standard was implemented after the 802.11e standard was approved to provide support for non 802.11e devices.D、 WMM is a Wi-Fi Alliance standard that was implemented before the 802.11e standard was approved.E、 WMM uses Enhanced DCF (EDCF) to stipulate fixed and random wait times for the different access classes.

考题 What does the Filesystem Hierarchy Standard enable? ()A、 software to predict the location of installed files and directoriesB、 software to predict the ownership and access rights to files and directoriesC、 users to predict the location of installed files and directoriesD、 users to predict how the filesystem should be formatted according to need

考题 单选题仅仅允许到主机1.1.1.1的SMTP邮件服务的命名访问控制列表语句是()。A ip access-list standard cisco permit smtp host 1.1.1.1B ip access-list extended cisco permit ip smtp host 1.1.1.1C ip access-list standard cisco permit tcp any host 1.1.1.1 eq smtpD ip access-list extended cisco permit tcp any host 1.1.1.1 eq smtp

考题 多选题Which of the following are characteristics of named access lists?()AIndividual statements in a named access list may be deleted.BThey require a numbered range from 1000 to 1099.CWhen created, they must be specified as standard or extended.DThey are created with the ip access-list command.EThe entire access list must be deleted before editing.FThey are applied with the ip name-group command.

考题 单选题A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()A The source and destination addressesB The destination port numberC The destination addressD The source addressE All of the above

考题 单选题You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. Apre-shared key is not configured on the wireless access point. You need to connect a computer that runsWindows 7 to the wireless access point.  Which security setting should you select for the wirelessconnection?()A 802.1xB WPA-PersonalC WPA2-EnterpriseD WPA2-Personal

考题 多选题你需要创建一个标准命名访问控制列表cisco用来拒绝主机172.16.198.94/19所在的子网,表示错误的有()。Aip access-list standard cisco deny 172.16.192.0 0.0.31.255Bip access-list standard cisco deny 172.16.0.0 0.0.255.255Cip access-list standard cisco deny 172.16.172.0 0.0.31.255Dip access-list standard cisco deny 172.16.188.0 0.0.15.255Eip access-list standard cisco deny 172.16.192.0 0.0.15.255

考题 多选题A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()AAdd the switch to the Junos Pulse Access Control Service as a standard RADIUS.BAdd the switch to the Junos Pulse Access Control Service using the Any make/model.CAdd the switch as a firewall enforcer.DObtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.

考题 多选题Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()Aboth WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)Bboth WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementationCWPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devicesDWPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryptionEWPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

考题 多选题What are some general guidelines regarding the placement of access control lists?()AYou should place standard ACLS as close as possible to the source of traffic to be denied.BYou should place extended ACLS as close as possible to the source of traffic to be denied.CYou should place standard ACLS as close as possible to the destination of traffic to be denied.DYou should place extended ACLS should be places as close as possible to the destination of traffic to be denied.

考题 单选题The SAVE_AMT column in the ACCOUNTS table contains the balance details of customers in a bank. As part of the year-end tax and interest calculation process, all the rows in the table need to be accessed. The bank authorities want to track access to the rows containing balance amounts exceeding $200,000, and then send an alert message to the administrator. Which method would you suggest to the bank for achieving this task?()A implementing value-based auditing by using triggersB implementing fine-grained auditing with audit condition and event handlerC performing standard database auditing to audit object privileges by setting the AUDIT_TRAIL parameter to EXTENDEDD performing standard database auditing to audit SQL statements with granularity level set to ACCESS

考题 多选题Which of the following answer choices are correct characteristics of named access list?()AYou can delete individual statements in a named access listBNamed access lists require a numbered range from 1000 to 1099.CNamed access lists must be specified as standard or extended.DYou can use the ip access-list command to create named access lists.EYou cannot delete individual statements in a named access list.FYou can use the ip name-group command to apply named access lists.