How will the above access lists affect traffic?()A.FTP traffic from 192.169.1.22 will be deniedB.No traffic, except for FTP traffic will be allowed to exit E0C.FTP traffic from 192.169.1.9 to any host will be deniedD.All traffic exiting E0 will be deniedE

题目
How will the above access lists affect traffic?()

A.FTP traffic from 192.169.1.22 will be denied

B.No traffic, except for FTP traffic will be allowed to exit E0

C.FTP traffic from 192.169.1.9 to any host will be denied

D.All traffic exiting E0 will be denied

E.All FTP traffic to network 192.169.1.9/29 will be denied


相似考题
更多“How will the above access lists affect traffic?() ”相关问题
  • 第1题:

    What are two step needed to define a QoS policy for a traffic class?()

    • A、determine a minimum bandwidth guarantee
    • B、determine interfaces to which to apply policy
    • C、assign priorities to the class
    • D、configure access control lists

    正确答案:A,C

  • 第2题:

    Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()

    • A、 The data traffic between the access point and controller is not encrypted.
    • B、 The data traffic is encapsulated with LWAPP.
    • C、 The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.
    • D、 The data traffic is encrypted with AES.
    • E、 All of the above

    正确答案:B

  • 第3题:

    What are two steps needed to define a QoS policy for a traffic class?()

    • A、 Determine a minimum bandwidth guarantee.
    • B、 Determine interfaces to which to apply policy.
    • C、 Assign priorities to the class.
    • D、 Configure access control lists.

    正确答案:A,C

  • 第4题:

    How will the above access lists affect traffic?()

    • A、FTP traffic from 192.169.1.22 will be denied
    • B、No traffic, except for FTP traffic will be allowed to exit E0
    • C、FTP traffic from 192.169.1.9 to any host will be denied
    • D、All traffic exiting E0 will be denied
    • E、All FTP traffic to network 192.169.1.9/29 will be denied

    正确答案:D

  • 第5题:

    How does a controller-based access point configured to operate in sniffer mode behave?()

    • A、allows client traffic, captures data on all channels
    • B、allows client traffic, captures data on a single channel
    • C、allows no client traffic, captures data on all channels
    • D、allows no client traffic, captures data on a single channel

    正确答案:D

  • 第6题:

    Which statement about access lists that are applied to an interface is true?()

    • A、you can apply multiple access lists with the same protocol or in different…
    • B、you can config one access list,per direction,per layer 3 protocol
    • C、you can place as many access lists as you want on any interface
    • D、you can apply ony one access list on any interface

    正确答案:D

  • 第7题:

    单选题
    On your newly installed router, you apply the access list illustrated below to interface Ethernet 0 on a Cisco router. The interface is connected to the 192.168.1.8/29 LAN. access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 20 any access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 21 any How will the above access lists affect traffic?()
    A

    All traffic will be allowed to exit E0 except FTP traffic.

    B

    FTP traffic from 192.168.166.19 to any host will be denied.

    C

    FTP traffic from 192.168.166.22 to any host will be denied.

    D

    All traffic exiting E0 will be denied.

    E

    All FTP traffic to network 192.168.166.18/29 from any host will be denied.


    正确答案: C
    解析: 暂无解析

  • 第8题:

    多选题
    Which of the following are benefits provided with access control lists (ACLs)?()
    A

    ACLs monitor the number of bytes and packets.

    B

    Virus detection.

    C

    ACLs dentify interesting traffic for DDR.

    D

    ACLs provide IP route filtering.

    E

    ACLs provide high network availability.

    F

    ACLs classify and organize network traffic.


    正确答案: F,A
    解析: 暂无解析

  • 第9题:

    单选题
    Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the path cost calculated?()
    A

    number of hops

    B

    priority of the bridge

    C

    interface bandwidth

    D

    interface delay

    E

    None of the above


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    What are some general guidelines regarding the placement of access control lists?()
    A

    You should place standard ACLS as close as possible to the source of traffic to be denied.

    B

    You should place extended ACLS as close as possible to the source of traffic to be denied.

    C

    You should place standard ACLS as close as possible to the destination of traffic to be denied.

    D

    You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.


    正确答案: B,A
    解析: 暂无解析

  • 第11题:

    单选题
    An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
    A

    Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.

    B

    Configure pNAT to ensure Voice over IP packets are properly translated.

    C

    Configure IOS firewall to permit RTP port numbers through the firewall via VPN. 

    D

    Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()
    A

     The data traffic between the access point and controller is not encrypted.

    B

     The data traffic is encapsulated with LWAPP.

    C

     The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.

    D

     The data traffic is encrypted with AES.

    E

     All of the above


    正确答案: B
    解析: 暂无解析

  • 第13题:

    An administrator analyzes a poorly performing system and suspects that the issue is related to CPU resource. Upon reviewing output of vmstat, the administrator is concerned with the values in the ‘pc’ and ‘ec’ columns. Which definition describes these two headings?()

    • A、'pc' refers to the number of physical processors consumed, while 'ec' refers to the percentage of entitled capacity consumed.
    • B、'pc' refers to the 'physical CPUs' and lists how many are left un-allocated, while ec' refers to the 'entitled CPUs' and lists what amount is currently allocated to the LPAR.
    • C、'pc' refers to the 'processor count' and reflects how many CPUs are allocated to the LPAR, while 'ec ' refers to the 'extra capacity' and lists how much above the LPAR entitlement is being consumed.
    • D、'pc' refers to 'processor cards' and reflects how many MCM modules are actually being used by this LPAR, while 'ec' refers to the 'entitled CPUs'and lists what amount is currently allocated to the LPAR.

    正确答案:A

  • 第14题:

    Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the path cost calculated?()

    • A、number of hops
    • B、priority of the bridge
    • C、interface bandwidth
    • D、interface delay
    • E、None of the above

    正确答案:C

  • 第15题:

    Which of the following are benefits provided with access control lists (ACLs)?()

    • A、ACLs monitor the number of bytes and packets.
    • B、Virus detection.
    • C、ACLs dentify interesting traffic for DDR.
    • D、ACLs provide IP route filtering.
    • E、ACLs provide high network availability.
    • F、ACLs classify and organize network traffic.

    正确答案:C,D

  • 第16题:

    What are two reasons that a network administrator would use access lists? (Choose two.) ()。

    • A、to control vty access into a router  
    • B、to control broadcast traffic through a router  
    • C、to filter traffic as it passes through a router  
    • D、to filter traffic that originates from the router  
    • E、to replace passwords as a line of defense against security incursions 

    正确答案:A,C

  • 第17题:

    When implementing 802.1X on Teleworker routers and using separate DHCP address pools for Teleworker and Home-user devices, traffic between devices can be restricted. How can you best accomplish this?()

    • A、Access Lists between the inside interface and loopback interface
    • B、Context Based Access Control
    • C、Dynamic Host Configuration Protocol
    • D、Network Address translation

    正确答案:A

  • 第18题:

    Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()

    • A、the log option for the particular SCREEN option
    • B、the permit option for the particular SCREEN option
    • C、the SCREEN option, because it does not drop traffic by default
    • D、the alarm-without-drop option for the particular SCREEN option

    正确答案:D

  • 第19题:

    单选题
    The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN: access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 21 any How will the above access lists affect traffic? ()
    A

    FTP traffic from 192.169.1.22 will be denied

    B

    No traffic, except for FTP traffic will be allowed to exit E0

    C

    FTP traffic from 192.169.1.9 to any host will be denied

    D

    All traffic exiting E0 will be denied

    E

    All FTP traffic to network 192.169.1.9/29 will be denied


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    When implementing 802.1X on Teleworker routers and using separate DHCP address pools for Teleworker and Home-user devices, traffic between devices can be restricted. How can you best accomplish this?()
    A

    Access Lists between the inside interface and loopback interface

    B

    Context Based Access Control

    C

    Dynamic Host Configuration Protocol

    D

    Network Address translation


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()
    A

    the log option for the particular SCREEN option

    B

    the permit option for the particular SCREEN option

    C

    the SCREEN option, because it does not drop traffic by default

    D

    the alarm-without-drop option for the particular SCREEN option


    正确答案: B
    解析: 暂无解析

  • 第22题:

    多选题
    Which of the following answer choices are correct characteristics of named access list?()
    A

    You can delete individual statements in a named access list

    B

    Named access lists require a numbered range from 1000 to 1099.

    C

    Named access lists must be specified as standard or extended.

    D

    You can use the ip access-list command to create named access lists.

    E

    You cannot delete individual statements in a named access list.

    F

    You can use the ip name-group command to apply named access lists.


    正确答案: F,C
    解析: 暂无解析

  • 第23题:

    单选题
    Th efollowing access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29LAN: access-list 135 deny tcp 192.169.1.80.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.80.0.0.7 e q21 any How will the above access lists affect traffic?()
    A

    FTP traffic from 192.169.1.22 wil lbe denied

    B

    Not raffic,except for FTP traffic wil lbe allowed to exit E0

    C

    FTP traffic from 192.169.1.9 to any host will be denied

    D

    All traffic exiting E0 will be denied

    E

    All FTP traffic to network 192.169.1.9/29 will be denied


    正确答案: D
    解析: 暂无解析