A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not m

题目

A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()

  • A、The traffic is dropped
  • B、The resulting action is determined by the destination IP address
  • C、The source IP address is checked,and,if a match is not found, traffic is routed out interface Serial 1
  • D、The resulting action is determined by the destination IP address and port number

相似考题
更多“A standard access”相关问题
  • 第1题:

    On which options are standard access list based?()

    A. source address and subnet mask

    B. destination address and wildcard mask

    C. source address and wildcard mask

    D. destination address and subnet mask


    参考答案:C

  • 第2题:

    请问用于过滤只接收指定路由器发送的路由信息的命令组合是()

    A. ip ip-prefix prefix-list-name

    B. ip access-list \{standard | extended} access-list name

    C. filter-policy gateway prefix-list-name import

    D. filter-policy gateway access-list-name import


    参考答案:A, C

  • 第3题:

    Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()

    • A、both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
    • B、both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
    • C、WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
    • D、WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
    • E、WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

    正确答案:A,E

  • 第4题:

    What are two roles of the authenticator as described in the 802.1X standard? ()

    • A、It proxies the authentication information between the supplicant and the authentication server.
    • B、It controls physical access to the network.
    • C、It communicates with the authentication server only.
    • D、It is responsible for verifying the identity of the supplicant through the use of an internal database.

    正确答案:A,B

  • 第5题:

    Which two statements about the implementation of WLAN QoS are true?()

    • A、The 802.11e standard is the IEEE 802.11 OoS WLAN standard.
    • B、The Wi-Fi Multimedia (WMM) standard decreases the eight priority levels to four access categories.
    • C、The Wi-Fi Multimedia (WMM) standard is a Wi-Fi Alliance standard that increases the four priority levels to eight access categories.
    • D、The Wi-Fi Multimedia (WMM) standard is an IEEE standard that increases the four priority levels to eight access categories.
    • E、Wireless 802.11 deploys Distributed Coordination Function (DCF), carrier sense multiple access with collision detection (CSMA/CD), interframe spacing, and random wait timers to avoid collisions.
    • F、Wireless OoS designs and implementations commonly use Layer 3 differentiated services code point (DSCP) or Layer 2 802.1 p to ensure priority

    正确答案:A,B

  • 第6题:

    On which options are standard access list based?()

    • A、source address and subnet mask
    • B、destination address and wildcard mask
    • C、source address and wildcard mask
    • D、destination address and subnet mask

    正确答案:C

  • 第7题:

    Which two statements about the Wi-Fi Multimedia (WMM) standard are true?()

    • A、 Lower-priority traffic is assigned short interframe wait-timers to allow higher-priority traffic access to the wireless network first.
    • B、 Packets that are not assigned to a specific access category are categorized by default as the background access category.
    • C、 The WMM standard was implemented after the 802.11e standard was approved to provide support for non 802.11e devices.
    • D、 WMM is a Wi-Fi Alliance standard that was implemented before the 802.11e standard was approved.
    • E、 WMM uses Enhanced DCF (EDCF) to stipulate fixed and random wait times for the different access classes.

    正确答案:D,E

  • 第8题:

    单选题
    仅仅允许到主机1.1.1.1的SMTP邮件服务的命名访问控制列表语句是()。
    A

    ip access-list standard cisco permit smtp host 1.1.1.1

    B

    ip access-list extended cisco permit ip smtp host 1.1.1.1

    C

    ip access-list standard cisco permit tcp any host 1.1.1.1 eq smtp

    D

    ip access-list extended cisco permit tcp any host 1.1.1.1 eq smtp


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()
    A

    The source and destination addresses

    B

    The destination port number

    C

    The destination address

    D

    The source address

    E

    All of the above


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    你需要创建一个标准命名访问控制列表cisco用来拒绝主机172.16.198.94/19所在的子网,表示错误的有()。
    A

    ip access-list standard cisco deny 172.16.192.0 0.0.31.255

    B

    ip access-list standard cisco deny 172.16.0.0 0.0.255.255

    C

    ip access-list standard cisco deny 172.16.172.0 0.0.31.255

    D

    ip access-list standard cisco deny 172.16.188.0 0.0.15.255

    E

    ip access-list standard cisco deny 172.16.192.0 0.0.15.255


    正确答案: B,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()
    A

    both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)

    B

    both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation

    C

    WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices

    D

    WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption

    E

    WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP


    正确答案: E,A
    解析: 暂无解析

  • 第12题:

    单选题
    The SAVE_AMT column in the ACCOUNTS table contains the balance details of customers in a bank. As part of the year-end tax and interest calculation process, all the rows in the table need to be accessed. The bank authorities want to track access to the rows containing balance amounts exceeding $200,000, and then send an alert message to the administrator. Which method would you suggest to the bank for achieving this task?()
    A

    implementing value-based auditing by using triggers

    B

    implementing fine-grained auditing with audit condition and event handler

    C

    performing standard database auditing to audit object privileges by setting the AUDIT_TRAIL parameter to EXTENDED

    D

    performing standard database auditing to audit SQL statements with granularity level set to ACCESS


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which item represents the standard IPACL?()

    A.access-list 50 deny 192.168.1.10.0.0.255

    B.access-list 110 permit ip any any

    C.access-list 2500 deny tcp any host 192.168.1.1 eq22

    D.access-list 101 deny tcp any host 192.168.1.1


    参考答案:A

  • 第14题:

    Which of the following are characteristics of named access lists?()

    • A、Individual statements in a named access list may be deleted.
    • B、They require a numbered range from 1000 to 1099.
    • C、When created, they must be specified as standard or extended.
    • D、They are created with the ip access-list command.
    • E、The entire access list must be deleted before editing.
    • F、They are applied with the ip name-group command.

    正确答案:A,C,D

  • 第15题:

    A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()

    • A、The source and destination addresses
    • B、The destination port number
    • C、The destination address
    • D、The source address
    • E、All of the above

    正确答案:D

  • 第16题:

    创建一个标准命名访问控制列表cisco用来拒绝网络192.168.160.0到192.168.191.0内的主机,下面表达式正确的是()。

    • A、ip access-list standard cisco deny 192.168.160.0 255.255.240.0
    • B、ip access-list standard cisco deny 192.168.160.0 0.0.191.255
    • C、ip access-list standard cisco deny 192.168.160.0 0.0.31.255
    • D、ip access-list standard cisco deny 192.168.0.0 0.0.31.255

    正确答案:C

  • 第17题:

    Which item represents the standard IP ACL?()

    • A、access-list 50 deny 192.168.1.1 0.0.0.255
    • B、access-list 110 permit ip any any
    • C、access-list 2500 deny tcp any host 192.168.1.1 eq 22
    • D、access-list 101 deny tcp any host 192.168.1.1

    正确答案:A

  • 第18题:

    Which item represents the standard IP ACL?()

    • A、access-list 50 deny 192.168.1.10.0.0.255
    • B、access-list 110 permitip any any
    • C、access-list 2500 deny tcp any host 192.168.1.1eq22
    • D、access-list 101 deny tcp any host 192.168.1.1

    正确答案:A

  • 第19题:

    What does the Filesystem Hierarchy Standard enable? ()

    • A、 software to predict the location of installed files and directories
    • B、 software to predict the ownership and access rights to files and directories
    • C、 users to predict the location of installed files and directories
    • D、 users to predict how the filesystem should be formatted according to need

    正确答案:A,C

  • 第20题:

    多选题
    Which of the following are characteristics of named access lists?()
    A

    Individual statements in a named access list may be deleted.

    B

    They require a numbered range from 1000 to 1099.

    C

    When created, they must be specified as standard or extended.

    D

    They are created with the ip access-list command.

    E

    The entire access list must be deleted before editing.

    F

    They are applied with the ip name-group command.


    正确答案: C,D
    解析: 暂无解析

  • 第21题:

    单选题
    You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. Apre-shared key is not configured on the wireless access point. You need to connect a computer that runsWindows 7 to the wireless access point.  Which security setting should you select for the wirelessconnection?()
    A

    802.1x

    B

    WPA-Personal

    C

    WPA2-Enterprise

    D

    WPA2-Personal


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()
    A

    Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.

    B

    Add the switch to the Junos Pulse Access Control Service using the Any make/model.

    C

    Add the switch as a firewall enforcer.

    D

    Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    What are some general guidelines regarding the placement of access control lists?()
    A

    You should place standard ACLS as close as possible to the source of traffic to be denied.

    B

    You should place extended ACLS as close as possible to the source of traffic to be denied.

    C

    You should place standard ACLS as close as possible to the destination of traffic to be denied.

    D

    You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.


    正确答案: B,A
    解析: 暂无解析

  • 第24题:

    多选题
    Which of the following answer choices are correct characteristics of named access list?()
    A

    You can delete individual statements in a named access list

    B

    Named access lists require a numbered range from 1000 to 1099.

    C

    Named access lists must be specified as standard or extended.

    D

    You can use the ip access-list command to create named access lists.

    E

    You cannot delete individual statements in a named access list.

    F

    You can use the ip name-group command to apply named access lists.


    正确答案: F,C
    解析: 暂无解析