A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()
第1题:
A. source address and subnet mask
B. destination address and wildcard mask
C. source address and wildcard mask
D. destination address and subnet mask
第2题:
A. ip ip-prefix prefix-list-name
B. ip access-list \{standard | extended} access-list name
C. filter-policy gateway prefix-list-name import
D. filter-policy gateway access-list-name import
第3题:
Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()
第4题:
What are two roles of the authenticator as described in the 802.1X standard? ()
第5题:
Which two statements about the implementation of WLAN QoS are true?()
第6题:
On which options are standard access list based?()
第7题:
Which two statements about the Wi-Fi Multimedia (WMM) standard are true?()
第8题:
ip access-list standard cisco permit smtp host 1.1.1.1
ip access-list extended cisco permit ip smtp host 1.1.1.1
ip access-list standard cisco permit tcp any host 1.1.1.1 eq smtp
ip access-list extended cisco permit tcp any host 1.1.1.1 eq smtp
第9题:
The source and destination addresses
The destination port number
The destination address
The source address
All of the above
第10题:
ip access-list standard cisco deny 172.16.192.0 0.0.31.255
ip access-list standard cisco deny 172.16.0.0 0.0.255.255
ip access-list standard cisco deny 172.16.172.0 0.0.31.255
ip access-list standard cisco deny 172.16.188.0 0.0.15.255
ip access-list standard cisco deny 172.16.192.0 0.0.15.255
第11题:
both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP
第12题:
implementing value-based auditing by using triggers
implementing fine-grained auditing with audit condition and event handler
performing standard database auditing to audit object privileges by setting the AUDIT_TRAIL parameter to EXTENDED
performing standard database auditing to audit SQL statements with granularity level set to ACCESS
第13题:
A.access-list 50 deny 192.168.1.10.0.0.255
B.access-list 110 permit ip any any
C.access-list 2500 deny tcp any host 192.168.1.1 eq22
D.access-list 101 deny tcp any host 192.168.1.1
第14题:
Which of the following are characteristics of named access lists?()
第15题:
A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()
第16题:
创建一个标准命名访问控制列表cisco用来拒绝网络192.168.160.0到192.168.191.0内的主机,下面表达式正确的是()。
第17题:
Which item represents the standard IP ACL?()
第18题:
Which item represents the standard IP ACL?()
第19题:
What does the Filesystem Hierarchy Standard enable? ()
第20题:
Individual statements in a named access list may be deleted.
They require a numbered range from 1000 to 1099.
When created, they must be specified as standard or extended.
They are created with the ip access-list command.
The entire access list must be deleted before editing.
They are applied with the ip name-group command.
第21题:
802.1x
WPA-Personal
WPA2-Enterprise
WPA2-Personal
第22题:
Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.
Add the switch to the Junos Pulse Access Control Service using the Any make/model.
Add the switch as a firewall enforcer.
Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.
第23题:
You should place standard ACLS as close as possible to the source of traffic to be denied.
You should place extended ACLS as close as possible to the source of traffic to be denied.
You should place standard ACLS as close as possible to the destination of traffic to be denied.
You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.
第24题:
You can delete individual statements in a named access list
Named access lists require a numbered range from 1000 to 1099.
Named access lists must be specified as standard or extended.
You can use the ip access-list command to create named access lists.
You cannot delete individual statements in a named access list.
You can use the ip name-group command to apply named access lists.