A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()A、reflexiveB、extendedC、standardD、dynamic

题目

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()

  • A、reflexive
  • B、extended
  • C、standard
  • D、dynamic

相似考题
更多“A network engineer wants to allo”相关问题
  • 第1题:

    An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()

    A.netstat

    B.traceroute

    C.nbtstat

    D.ping


    参考答案:D

  • 第2题:

    A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()

    A. reflexive

    B. extended

    C. standard

    D. dynamic


    参考答案:D

  • 第3题:

    A company wants to expand their storage capacity in a flexible manner over their existing network.Which of the following storage solutions would they consider?()

    • A、External RAID array on an existing server
    • B、Network Attached Storage
    • C、Storage Area Network
    • D、Tape library

    正确答案:B

  • 第4题:

    As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()

    • A、GLBP
    • B、RSTP
    • C、BPDU guard
    • D、root guard

    正确答案:C

  • 第5题:

    As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()

    • A、Perform a network audit.
    • B、Form an impression about the network.
    • C、Use traffic analysis to augment organizational input.
    • D、Prepare and add to the network description.

    正确答案:C

  • 第6题:

    As an experienced Network Engineer, you are responsible for network connectivity and system configuration. Which of the following protocols will be supported by Cisco Nonstop Forwarding (NSF)?()

    • A、ISSU,OSPF,IS-IS
    • B、IETF,OSPF,ISSU
    • C、IS-IS,EIGRP,SSO,BGP
    • D、EIGRP,BGP,OSPF,IS-IS

    正确答案:D

  • 第7题:

    An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()

    • A、netstat
    • B、traceroute
    • C、nbtstat
    • D、ping

    正确答案:D

  • 第8题:

    An AIX server has 2 network interfaces and the system administrator wants to enable the users on the locally configured network interface to be able to connect to systems configured on the global network interface.  How is it accomplished?()

    • A、Enable routed on the server
    • B、Enable gated on the server
    • C、Enable ipforwarding on the server
    • D、Set network options back to default

    正确答案:C

  • 第9题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    As a Network Engineer, you have to master how to deploy Virtual Storage Area Network and what are the results of the deployment. Which two of the following are resulting from its deployment?()
    A

    reduced backup

    B

    increased security

    C

    greater storage demand

    D

    improved availability


    正确答案: B,C
    解析: 暂无解析

  • 第11题:

    单选题
    A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network.  Which of the following options is the most probable cause?()
    A

    A large FTP job is in process. 

    B

    A network interface was misconfigured. 

    C

    The ping command is being used excessively. 

    D

    A bad network interface card and/or network cable is in use. 


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()
    A

    RARP request

    B

    Show Network Address request

    C

    Proxy ARP request

    D

    ARP request

    E

    Show Hardware Address request


    正确答案: D
    解析: 暂无解析

  • 第13题:

    You work as a network engineer at TestKing.com. You are required to allow establishment of a Telnet session with a router TestKingC.Which set command must be configured?()

    A.

    B.

    C.

    D.

    E.

    F.


    参考答案:F

  • 第14题:

    A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network.  Which of the following options is the most probable cause?()

    • A、A large FTP job is in process. 
    • B、A network interface was misconfigured. 
    • C、The ping command is being used excessively. 
    • D、A bad network interface card and/or network cable is in use. 

    正确答案:C

  • 第15题:

    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

    • A、BPDU
    • B、Port security
    • C、RSTP
    • D、STP
    • E、VTP
    • F、Blocking mode

    正确答案:B

  • 第16题:

    You work as a network engineer for the company, you want to configure two BGP speakers to form an EBGP session across a firewall. On the engineer’s network, the firewall always permits TCP sessions that are initiated from the inside network (the network attached to the inside interface of the firewall). What prerequisite is there for enabling BGP to run on this network?()

    • A、EBGP multihop will need to be configured for this to work.
    • B、This should work with normal BGP peering, with no additional configuration on the BGP speakers or the firewall.
    • C、The BGP protocol port must be opened on the firewall
    • D、There is no way to make BGP work across a firewall.

    正确答案:A

  • 第17题:

    When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()

    • A、RARP request
    • B、Show Network Address request
    • C、Proxy ARP request
    • D、ARP request
    • E、Show Hardware Address request

    正确答案:D

  • 第18题:

    As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)

    • A、cost savings
    • B、product variety
    • C、well-tested interoperability
    • D、regular upgrade process

    正确答案:A,C

  • 第19题:

    An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()

    • A、IDS
    • B、IPS
    • C、Firewall
    • D、Managed PKI

    正确答案:A

  • 第20题:

    单选题
    As an experienced Network Engineer, you are responsible for network connectivity and system configuration. Which of the following protocols will be supported by Cisco Nonstop Forwarding (NSF)?()
    A

    ISSU,OSPF,IS-IS

    B

    IETF,OSPF,ISSU

    C

    IS-IS,EIGRP,SSO,BGP

    D

    EIGRP,BGP,OSPF,IS-IS


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()
    A

    Enable the highest level of Syslogging available to ensure you log all possible event messages

    B

    Use SSH to access your Syslog information

    C

    Log all messages to the system buffer so that they can be displayed when accessing the router

    D

    Syncronize clocks on the network with a protocol such as Network Time Protocol


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()
    A

    Disable SSID

    B

    WPA

    C

    MAC filtering

    D

    RAS


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
    A

    BPDU

    B

    Port security

    C

    RSTP

    D

    STP

    E

    VTP

    F

    Blocking mode


    正确答案: B
    解析: 暂无解析