單項選擇題

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

A.Access-list 101 was configured for the trusted interface, and access-list 100 was configured forthe untrusted interface
B.Access-list 100 was configured for the trusted interface, and access-list 101 was configured forthe untrusted interface
C.Access-list 100 was configured for the inbound direction, and access-list 101 was configured forthe outbound direction on the trusted interface
D.Access-list 100 was configured for the inbound direction, and access-list 101 was configured forthe outbound direction on the untrusted interface


您可能感興趣的試卷

你可能感興趣的試題

5.單項選擇題


You are working as a network technician, study the exhibit carefully. Your boss has informed youthat there have been problems with the WAN that is using EIGRP routing protocol. You arerequired to troubleshoot these problems.
Before going to the questions of this sim, we should have a quick review about GRE tunneling:GRE Quick Summary.
The picture below shows how to configure a GRE Tunnel between two routers, notice that the"tunnel destination" must be the IP address of the interface, not of the opposite tunnel.

Notice: The tunnel source on one router must be specified as the tunnel destination on the otherrouter.
Below are the questions of this lab-sim.
What is the reason for the ping between the HQ router and the 192.168.1.193 interface on theBranch2 router failing?()

A.The default route is missing from the Branch2 router
B.When running EIGRP over GRE tunnels, you must manually configure the neighbor addressusing the eigrp neighbor ip address command
C.The tunnel numbers for the tunnel between the HQ router and the Branch2 router do not match
D.The tunnel source is incorrect on the Branch2 router It should be serial 2/0
E.The AS number for the EIGRP process on Branch2 should be 1 and not 11

最新試題

cisco ios command to interface dialer 0

題型:問答題

Refer to the exhibit. Which two statements about the AAA configuration are true?()

題型:多項選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

Drag the DSL local loop topic on the left to the correct descriptions on the right.

題型:問答題

Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.

題型:問答題

Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)

題型:問答題

Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.

題型:問答題

IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()

題型:多項選擇題

Network Topology Exhibit:Configuration Exhibit:NET(config)# access-list 112 deny icmp any any echo logNET(config)# access-list 112 deny imp any any redirect logNET(config)# access-list 112 deny icmp any any mask-request logNET(config)# access-list 112 permit icmp any 10.1.1.0 0.0.0.255NET(config)# interface Fa0/1NET(config-if)# ip access-group 112 inYou work as a network administrator at networkTut.com, study the exhibit carefully. Theconfiguration has been applied to router NET to mitigate the threat of certain types of ICMPbasedattacks while allowing some ICMP traffic to the corporate LAN to work. However, the configurationis incorrect. On the basis of the information in the exhibit, which configuration option wouldcorrectly configure router NET?()

題型:單項選擇題

Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()

題型:多項選擇題