网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Which of the following answer choices are correct characteristics of named access list?()

A. You can delete individual statements in a named access list

B. Named access lists require a numbered range from 1000 to 1099.

C. Named access lists must be specified as standard or extended.

D. You can use the ip access-list command to create named access lists.

E. You cannot delete individual statements in a named access list.

F. You can use the ip name-group command to apply named access lists.


参考答案

更多 “ Which of the following answer choices are correct characteristics of named access list?() A. You can delete individual statements in a named access listB. Named access lists require a numbered range from 1000 to 1099.C. Named access lists must be specified as standard or extended.D. You can use the ip access-list command to create named access lists.E. You cannot delete individual statements in a named access list.F. You can use the ip name-group command to apply named access lists. ” 相关考题
考题 Which of following VLAN frame. encapsulation types are configurable on a Cisco switch? (Select two answer choices.)A. VTPB. 802.1QC. LLCD. ISLE. CDPF. PAP

考题 Which two of the following values does STP take into consideration when it elects the root bridge? (Select two answer choices)A. The BPDU version numberB. The access layer bridge settingC. The Bridge IDD. The spanning-tree update numberE. The bridge priorityF. The VLAN number

考题 Which of the following is the correct command to list the filesystems in datavg?() A. lsvg -p datavgB. lsvg -l datavgC. lsvg -L datavgD. lsvg -o datavg

考题 You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?() A. permit access-list 101 outB. ip access-group 101 outC. apply access-list 101 outD. access-class 101 outE. ip access-list e0 out

考题 Which of the following answer choices is an additional parameter which must be supplied before the IGRP routing process can initialize?() A. Connected subnet numbersB. Register administrative subnet masksC. IP address maskD. Autonomous system numberE. Metric weights

考题 Which of the following access list statements would deny traffic from a specifichost?() A. Router(config)# access-list 1 deny 172.31.212.74 anyB. Router(config)# access-list 1 deny 10.6.111.48 hostC. Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0D. Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0E. Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255

考题 As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()A.access-list 101 inB.access-list 101 outC.ip access-group 101 inD.ip access-group 101 out

考题 As a network administrator,you have been instructed to prevent all traffic or iginating on the LAN from entering the R2 router.Which the following command would implement the access list on the interface of theR2 router?()A.access-list 101 inB.access-list 101 outC.ipaccess-group 101 inD.ipaccess-group 101 out

考题 Which of the following are characteristics of named access lists?()A、Individual statements in a named access list may be deleted.B、They require a numbered range from 1000 to 1099.C、When created, they must be specified as standard or extended.D、They are created with the ip access-list command.E、The entire access list must be deleted before editing.F、They are applied with the ip name-group command.

考题 You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A、permit access-list 101 outB、ip access-group 101 outC、apply access-list 101 outD、access-class 101 outE、ip access-list e0 out

考题 Which of the following answer choices are correct characteristics of named access list?()A、You can delete individual statements in a named access listB、Named access lists require a numbered range from 1000 to 1099.C、Named access lists must be specified as standard or extended.D、You can use the ip access-list command to create named access lists.E、You cannot delete individual statements in a named access list.F、You can use the ip name-group command to apply named access lists.

考题 Which of the following IOS commands can detect whether the SQL slammer virus propagates in yournetworks?()A、access-list 100 permit any any udp eq 1434B、access-list 100 permit any any udp eq 1434 logC、access-list 110 permit any any udp eq 69D、access-list 110 permit any any udp eq 69 logE、None of above.

考题 Which of the following answer choices is an additional parameter which must be supplied before the IGRP routing process can initialize?()A、Connected subnet numbersB、Register administrative subnet masksC、IP address maskD、Autonomous system numberE、Metric weights

考题 Which of the following answer is correct to express the value 8 in octal number?()    A、 010B、 0x10C、 08D、 0x8

考题 With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()A、IETFB、PFCC、TCAMD、ASIC

考题 As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()A、access-list 101 inB、access-list 101 outC、ip access-group 101 inD、ip access-group 101 out

考题 Which of the following is the correct command to list the filesystems in datavg?()A、lsvg -p datavgB、lsvg -l datavgC、lsvg -L datavgD、lsvg -o datavg

考题 多选题Which of the following are factors of 240? (Indicate all of the answer choices that apply.)A6B9C12D20E36F45

考题 单选题Which of the following commands would successfully implement an access list on a routers virtual terminal line?()A RouterTK(config-line)# access-class 10 inB RouterTK(config-if)# ip access-class 23 outC RouterTK(config-line)# access-list 150 inD RouterTK(config-if)# ip access-list 128 outE RouterTK(config-line)# access-group 15 outF RouterTK(config-if)# ip access-group 110 in

考题 单选题Which of the following access list statements would deny traffic from a specifichost?()A Router(config)# access-list 1 deny 172.31.212.74 anyB Router(config)# access-list 1 deny 10.6.111.48 hostC Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0D Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0E Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255

考题 多选题Which of the following are characteristics of named access lists?()AIndividual statements in a named access list may be deleted.BThey require a numbered range from 1000 to 1099.CWhen created, they must be specified as standard or extended.DThey are created with the ip access-list command.EThe entire access list must be deleted before editing.FThey are applied with the ip name-group command.

考题 单选题Which of the following answer is correct to express the value 8 in octal number?()A  010B  0x10C  08D  0x8

考题 多选题Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL(Racl) is correct?()ACoPP protects against IP spoofing;Racl protects against DoS attacks.BCoPP can not use named access lists;Racl can use named access listsCCoPP applies to a dedicated control plane interface;Racl applies to all interfaces.DCoPP needs a AAA server,Racl does not need a AAA serverECoPP supports rate limits;Racl does not support rate limits

考题 单选题Which of the following answer choices is an additional parameter which must be supplied before the IGRP routing process can initialize?()A Connected subnet numbersB Register administrative subnet masksC IP address maskD Autonomous system numberE Metric weights

考题 多选题Which of the following answer choices are correct characteristics of named access list?()AYou can delete individual statements in a named access listBNamed access lists require a numbered range from 1000 to 1099.CNamed access lists must be specified as standard or extended.DYou can use the ip access-list command to create named access lists.EYou cannot delete individual statements in a named access list.FYou can use the ip name-group command to apply named access lists.

考题 单选题You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A permit access-list 101 outB ip access-group 101 outC apply access-list 101 outD access-class 101 outE ip access-list e0 out

考题 多选题If n = 6 × 15, which of the following are prime factors of n? (Indicate all of the answer choices that apply.)A2B3C7D9E15