网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()
A. show access-list
B. show ip access-list
C. show ip interface
D. show interface
E. show interface list
参考答案
更多 “ You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A. show access-listB. show ip access-listC. show ip interfaceD. show interfaceE. show interface list ” 相关考题
考题
Your database instance is running.You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?()
A. Oracle Net ManagerB. Listener Control utilityC. Database Configuration AssistantD. Oracle Net Configuration Assistant
考题
You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command ip access-group 101 in to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()A. Telnet sessions from host A to host 5.1.1.10B. Telnet sessions from host A to host 5.1.3.10C. Telnet sessions from host B to host 5.1.2.10D. Telnet sessions from host B to host 5.1.3.8E. Telnet sessions from host C to host 5.1.3.10F. Telnet sessions from host F to host 5.1.1.10
考题
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()
A. permit access-list 101 outB. ip access-group 101 outC. apply access-list 101 outD. access-class 101 outE. ip access-list e0 out
考题
You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines.What command would assign this access- list to the Virtual Terminal Lines?()A. router(config-line)# ip access-group 1 inB. router(config-line)# access-class 1 inC. router(config-line)# ip access-list 1 inD. router(config-line)# access-line 1 in
考题
A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()
A. The source and destination addressesB. The destination port numberC. The destination addressD. The source addressE. All of the above
考题
Which statement about access lists that are applied to an interface is true?()
A.you can apply multiple access lists with the same protocol or in different…B.you can config one access list,per direction,per layer 3 protocolC.you can placeasmanyaccess lists as you want on any interfaceD.you can apply ony one access list on any interface
考题
Which of the following are characteristics of named access lists?()A、Individual statements in a named access list may be deleted.B、They require a numbered range from 1000 to 1099.C、When created, they must be specified as standard or extended.D、They are created with the ip access-list command.E、The entire access list must be deleted before editing.F、They are applied with the ip name-group command.
考题
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A、permit access-list 101 outB、ip access-group 101 outC、apply access-list 101 outD、access-class 101 outE、ip access-list e0 out
考题
Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different direction.B、you can config one access list,per direction,per layer 3 protocolC、you can place as many access lists as you want on any interfaceD、you can apply only one access list on any interface
考题
Which of the following answer choices are correct characteristics of named access list?()A、You can delete individual statements in a named access listB、Named access lists require a numbered range from 1000 to 1099.C、Named access lists must be specified as standard or extended.D、You can use the ip access-list command to create named access lists.E、You cannot delete individual statements in a named access list.F、You can use the ip name-group command to apply named access lists.
考题
You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A、show access-listB、show ip access-listC、show ip interfaceD、show interfaceE、show interface list
考题
Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different…B、you can config one access list,per direction,per layer 3 protocolC、you can placeasmanyaccess lists as you want on any interfaceD、you can apply ony one access list on any interface
考题
A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()A、The source and destination addressesB、The destination port numberC、The destination addressD、The source addressE、All of the above
考题
A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()A、The traffic is droppedB、The resulting action is determined by the destination IP addressC、The source IP address is checked,and,if a match is not found, traffic is routed out interface Serial 1D、The resulting action is determined by the destination IP address and port number
考题
You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines. What command would assign this access- list to the Virtual Terminal Lines?()A、router(config-line)# ip access-group 1 inB、router(config-line)# access-class 1 inC、router(config-line)# ip access-list 1 inD、router(config-line)# access-line 1 in
考题
Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different…B、you can config one access list,per direction,per layer 3 protocolC、you can place as many access lists as you want on any interfaceD、you can apply ony one access list on any interface
考题
单选题Which command is used to display the placement and direction of an IP access control list on a router?()A
show access-listB
show ip routeC
show ip interfaceD
show interfaceE
show interface listF
show ip interface brief
考题
单选题ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()A
It is a list of remote database links stored in the XML file that are available to the users of the database.B
It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C
It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D
It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.
考题
单选题A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()A
The source and destination addressesB
The destination port numberC
The destination addressD
The source addressE
All of the above
考题
单选题You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()A
It is a list of remote database links stored in the XML file that are available to the users of the database.B
It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C
It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D
It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.
考题
单选题Your database instance is running. You are not able to access Oracle Enterprise Manager Database Control because the listener is not started. Which tool or utility would you use to start the listener?()A
Oracle Net ManagerB
Listener Control utilityC
Database Configuration AssistantD
Oracle Net Configuration Assistant
考题
单选题Your database instance is running.You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?()A
Oracle Net ManagerB
Listener Control utilityC
Database Configuration AssistantD
Oracle Net Configuration Assistant
考题
单选题Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A
Source IP and browserB
Source IP and certificateC
Certificate and Host CheckerD
Host Checker and source IP
考题
单选题A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()A
The traffic is droppedB
The resulting action is determined by the destination IP addressC
The source IP address is checked,and,if a match is not found, traffic is routed out interface Serial 1D
The resulting action is determined by the destination IP address and port number
考题
单选题You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A
show access-listB
show ip access-listC
show ip interfaceD
show interfaceE
show interface list
考题
单选题Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are displayed. What should you do?()A
Disable referrals.B
Modify the system access control list.C
Enable access-based enumeration (ABE).D
Modify the discretionary access control list.
考题
单选题You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A
permit access-list 101 outB
ip access-group 101 outC
apply access-list 101 outD
access-class 101 outE
ip access-list e0 out
热门标签
最新试卷