多項(xiàng)選擇題Which of the following answer choices are correct characteristics of named access list?()

A. You can delete individual statements in a named access list
B. Named access lists require a numbered range from 1000 to 1099.
C. Named access lists must be specified as standard or extended.
D. You can use the ip access-list command to create named access lists.
E. You cannot delete individual statements in a named access list.
F. You can use the ip name-group command to apply named access lists.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Which one of the access control list statements below will deny all telnet connections to subnet 10.10.1.0/24?()

A. access-list 15 deny telnet any 10.10.1.0 0.0.0.255 eq 23
B. access-list 115 deny udp any 10.10.1.0 eq telnet
C. access-list 15 deny tcp 10.10.1.0 255.255.255.0 eq telnet
D. access-list 115 deny tcp any 10.10.1.0 0.0.0.255 eq 23
E. access-list 15 deny udp any 10.10.1.0 255.255.255.0 eq 23

2.多項(xiàng)選擇題On the Hong Kong router an access list is needed that will accomplish the following:1. Allow a Telnet connection to the HR Server through the Internet2. Allow internet HTTP traffic to access the webserver3. Block any other traffic from the internet to everything elseWhich of the following access list statements are capable of accomplishing thesethree goals?()

A. access-list 101 permit tcp any 172.17.18.252 0.0.0.0 eq 80
B. access-list 1 permit tcp any 172.17.17.252 0.0.0.0 eq 23
C. access-list 101 permit tcp 172.17.17.252 0.0.0.0 any eq 23
D. access-list 101 deny tcp any 172.17.17.252 0.0.0.0 eq 23
E. access-list 101 deny tcp any 172.17.18.252 0.0.0.0 eq 80
F. access-list 101 permit tcp any 172.17.17.252 0.0.0.0 eq 23

3.多項(xiàng)選擇題Which of the following are benefits provided with access control lists (ACLs)?()

A. ACLs monitor the number of bytes and packets.
B. Virus detection.
C. ACLs dentify interesting traffic for DDR.
D. ACLs provide IP route filtering.
E. ACLs provide high network availability.
F. ACLs classify and organize network traffic.

4.單項(xiàng)選擇題When are packets processed in an inbound access list?()

A. Before they are routed to an outbound interface.
B. After they are routed for outbound traffic.
C. After they are routed to an outbound interface while queuing.
D. Before and after they are routed to an outbound interface.
E. Depends on the configuration of the interface
F. None of the above

5.單項(xiàng)選擇題In which situation would the use of a static route be appropriate?()

A. To configure a route to the first Layer 3 device on the network segment.
B. To configure a route from an ISP router into a corporate network.
C. To configure a route when the administrative distance of the current routing protocolis too low.
D. To reach a network is more than 15 hops away.
E. To provide access to the Internet for enterprise hosts.

最新試題

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()

題型:多項(xiàng)選擇題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項(xiàng)選擇題

A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()

題型:多項(xiàng)選擇題

Which of the following describe router functions?()

題型:多項(xiàng)選擇題

A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement describes the rule of split horizon?()

題型:?jiǎn)雾?xiàng)選擇題

A router with a serial interface will be used for an ISDN link.What other function group devices are required to complete the connection to the service provider? ()

題型:多項(xiàng)選擇題

Which of the following options lists the steps in PPP session establishment in the correct order?()

題型:?jiǎn)雾?xiàng)選擇題

What feature of a networks switch allows an administrative to create separate broadcast domains?()

題型:?jiǎn)雾?xiàng)選擇題

Which of the following host addresses are member of networks that can be routed across the public Internet? ()

題型:多項(xiàng)選擇題