网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which of the following answer choices are correct characteristics of named access list?()
A. You can delete individual statements in a named access list
B. Named access lists require a numbered range from 1000 to 1099.
C. Named access lists must be specified as standard or extended.
D. You can use the ip access-list command to create named access lists.
E. You cannot delete individual statements in a named access list.
F. You can use the ip name-group command to apply named access lists.
参考答案
更多 “ Which of the following answer choices are correct characteristics of named access list?() A. You can delete individual statements in a named access listB. Named access lists require a numbered range from 1000 to 1099.C. Named access lists must be specified as standard or extended.D. You can use the ip access-list command to create named access lists.E. You cannot delete individual statements in a named access list.F. You can use the ip name-group command to apply named access lists. ” 相关考题
考题
Which of following VLAN frame. encapsulation types are configurable on a Cisco switch? (Select two answer choices.)A. VTPB. 802.1QC. LLCD. ISLE. CDPF. PAP
考题
Which two of the following values does STP take into consideration when it elects the root bridge? (Select two answer choices)A. The BPDU version numberB. The access layer bridge settingC. The Bridge IDD. The spanning-tree update numberE. The bridge priorityF. The VLAN number
考题
Which of the following is the correct command to list the filesystems in datavg?()
A. lsvg -p datavgB. lsvg -l datavgC. lsvg -L datavgD. lsvg -o datavg
考题
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()
A. permit access-list 101 outB. ip access-group 101 outC. apply access-list 101 outD. access-class 101 outE. ip access-list e0 out
考题
Which of the following answer choices is an additional parameter which must be supplied before the IGRP routing process can initialize?()
A. Connected subnet numbersB. Register administrative subnet masksC. IP address maskD. Autonomous system numberE. Metric weights
考题
Which of the following access list statements would deny traffic from a specifichost?()
A. Router(config)# access-list 1 deny 172.31.212.74 anyB. Router(config)# access-list 1 deny 10.6.111.48 hostC. Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0D. Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0E. Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255
考题
As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()A.access-list 101 inB.access-list 101 outC.ip access-group 101 inD.ip access-group 101 out
考题
As a network administrator,you have been instructed to prevent all traffic or iginating on the LAN from entering the R2 router.Which the following command would implement the access list on the interface of theR2 router?()A.access-list 101 inB.access-list 101 outC.ipaccess-group 101 inD.ipaccess-group 101 out
考题
Which of the following are characteristics of named access lists?()A、Individual statements in a named access list may be deleted.B、They require a numbered range from 1000 to 1099.C、When created, they must be specified as standard or extended.D、They are created with the ip access-list command.E、The entire access list must be deleted before editing.F、They are applied with the ip name-group command.
考题
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A、permit access-list 101 outB、ip access-group 101 outC、apply access-list 101 outD、access-class 101 outE、ip access-list e0 out
考题
Which of the following answer choices are correct characteristics of named access list?()A、You can delete individual statements in a named access listB、Named access lists require a numbered range from 1000 to 1099.C、Named access lists must be specified as standard or extended.D、You can use the ip access-list command to create named access lists.E、You cannot delete individual statements in a named access list.F、You can use the ip name-group command to apply named access lists.
考题
Which of the following IOS commands can detect whether the SQL slammer virus propagates in yournetworks?()A、access-list 100 permit any any udp eq 1434B、access-list 100 permit any any udp eq 1434 logC、access-list 110 permit any any udp eq 69D、access-list 110 permit any any udp eq 69 logE、None of above.
考题
Which of the following answer choices is an additional parameter which must be supplied before the IGRP routing process can initialize?()A、Connected subnet numbersB、Register administrative subnet masksC、IP address maskD、Autonomous system numberE、Metric weights
考题
Which of the following answer is correct to express the value 8 in octal number?() A、 010B、 0x10C、 08D、 0x8
考题
With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()A、IETFB、PFCC、TCAMD、ASIC
考题
As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()A、access-list 101 inB、access-list 101 outC、ip access-group 101 inD、ip access-group 101 out
考题
Which of the following is the correct command to list the filesystems in datavg?()A、lsvg -p datavgB、lsvg -l datavgC、lsvg -L datavgD、lsvg -o datavg
考题
多选题Which of the following are factors of 240? (Indicate all of the answer choices that apply.)A6B9C12D20E36F45
考题
单选题Which of the following commands would successfully implement an access list on a routers virtual terminal line?()A
RouterTK(config-line)# access-class 10 inB
RouterTK(config-if)# ip access-class 23 outC
RouterTK(config-line)# access-list 150 inD
RouterTK(config-if)# ip access-list 128 outE
RouterTK(config-line)# access-group 15 outF
RouterTK(config-if)# ip access-group 110 in
考题
单选题Which of the following access list statements would deny traffic from a specifichost?()A
Router(config)# access-list 1 deny 172.31.212.74 anyB
Router(config)# access-list 1 deny 10.6.111.48 hostC
Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0D
Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0E
Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255
考题
多选题Which of the following are characteristics of named access lists?()AIndividual statements in a named access list may be deleted.BThey require a numbered range from 1000 to 1099.CWhen created, they must be specified as standard or extended.DThey are created with the ip access-list command.EThe entire access list must be deleted before editing.FThey are applied with the ip name-group command.
考题
单选题Which of the following answer is correct to express the value 8 in octal number?()A
010B
0x10C
08D
0x8
考题
多选题Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL(Racl) is correct?()ACoPP protects against IP spoofing;Racl protects against DoS attacks.BCoPP can not use named access lists;Racl can use named access listsCCoPP applies to a dedicated control plane interface;Racl applies to all interfaces.DCoPP needs a AAA server,Racl does not need a AAA serverECoPP supports rate limits;Racl does not support rate limits
考题
单选题Which of the following answer choices is an additional parameter which must be supplied before the IGRP routing process can initialize?()A
Connected subnet numbersB
Register administrative subnet masksC
IP address maskD
Autonomous system numberE
Metric weights
考题
多选题Which of the following answer choices are correct characteristics of named access list?()AYou can delete individual statements in a named access listBNamed access lists require a numbered range from 1000 to 1099.CNamed access lists must be specified as standard or extended.DYou can use the ip access-list command to create named access lists.EYou cannot delete individual statements in a named access list.FYou can use the ip name-group command to apply named access lists.
考题
单选题You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A
permit access-list 101 outB
ip access-group 101 outC
apply access-list 101 outD
access-class 101 outE
ip access-list e0 out
考题
多选题If n = 6 × 15, which of the following are prime factors of n? (Indicate all of the answer choices that apply.)A2B3C7D9E15
热门标签
最新试卷