A.FTP traffic from 192.169.1.22 will be denied
B.No traffic, except for FTP traffic will be allowed to exit E0
C.FTP traffic from 192.169.1.9 to any host will be denied
D.All traffic exiting E0 will be denied
E.All FTP traffic to network 192.169.1.9/29 will be denied
第1题:
What are two step needed to define a QoS policy for a traffic class?()
第2题:
Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()
第3题:
What are two steps needed to define a QoS policy for a traffic class?()
第4题:
How will the above access lists affect traffic?()
第5题:
How does a controller-based access point configured to operate in sniffer mode behave?()
第6题:
Which statement about access lists that are applied to an interface is true?()
第7题:
All traffic will be allowed to exit E0 except FTP traffic.
FTP traffic from 192.168.166.19 to any host will be denied.
FTP traffic from 192.168.166.22 to any host will be denied.
All traffic exiting E0 will be denied.
All FTP traffic to network 192.168.166.18/29 from any host will be denied.
第8题:
ACLs monitor the number of bytes and packets.
Virus detection.
ACLs dentify interesting traffic for DDR.
ACLs provide IP route filtering.
ACLs provide high network availability.
ACLs classify and organize network traffic.
第9题:
number of hops
priority of the bridge
interface bandwidth
interface delay
None of the above
第10题:
You should place standard ACLS as close as possible to the source of traffic to be denied.
You should place extended ACLS as close as possible to the source of traffic to be denied.
You should place standard ACLS as close as possible to the destination of traffic to be denied.
You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.
第11题:
Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.
Configure pNAT to ensure Voice over IP packets are properly translated.
Configure IOS firewall to permit RTP port numbers through the firewall via VPN.
Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.
第12题:
The data traffic between the access point and controller is not encrypted.
The data traffic is encapsulated with LWAPP.
The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.
The data traffic is encrypted with AES.
All of the above
第13题:
An administrator analyzes a poorly performing system and suspects that the issue is related to CPU resource. Upon reviewing output of vmstat, the administrator is concerned with the values in the ‘pc’ and ‘ec’ columns. Which definition describes these two headings?()
第14题:
Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the path cost calculated?()
第15题:
Which of the following are benefits provided with access control lists (ACLs)?()
第16题:
What are two reasons that a network administrator would use access lists? (Choose two.) ()。
第17题:
When implementing 802.1X on Teleworker routers and using separate DHCP address pools for Teleworker and Home-user devices, traffic between devices can be restricted. How can you best accomplish this?()
第18题:
Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()
第19题:
FTP traffic from 192.169.1.22 will be denied
No traffic, except for FTP traffic will be allowed to exit E0
FTP traffic from 192.169.1.9 to any host will be denied
All traffic exiting E0 will be denied
All FTP traffic to network 192.169.1.9/29 will be denied
第20题:
Access Lists between the inside interface and loopback interface
Context Based Access Control
Dynamic Host Configuration Protocol
Network Address translation
第21题:
the log option for the particular SCREEN option
the permit option for the particular SCREEN option
the SCREEN option, because it does not drop traffic by default
the alarm-without-drop option for the particular SCREEN option
第22题:
You can delete individual statements in a named access list
Named access lists require a numbered range from 1000 to 1099.
Named access lists must be specified as standard or extended.
You can use the ip access-list command to create named access lists.
You cannot delete individual statements in a named access list.
You can use the ip name-group command to apply named access lists.
第23题:
FTP traffic from 192.169.1.22 wil lbe denied
Not raffic,except for FTP traffic wil lbe allowed to exit E0
FTP traffic from 192.169.1.9 to any host will be denied
All traffic exiting E0 will be denied
All FTP traffic to network 192.169.1.9/29 will be denied