What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A.protocolB.VLAN numberC.TCP or UDP port numbersD.source switch port numberE.source IP address and destination IP addressF.source MAC address and d

题目
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

A.protocol

B.VLAN number

C.TCP or UDP port numbers

D.source switch port number

E.source IP address and destination IP address

F.source MAC address and destination MAC address


相似考题
参考答案和解析
参考答案:A, C, E
更多“What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。 ”相关问题
  • 第1题:

    What are the three main parts of a syslog message? ()(Choose three.)

    • A、severity level
    • B、facility
    • C、log message name
    • D、time stamp
    • E、error codes
    • F、access privilege

    正确答案:A,C,D

  • 第2题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第3题:

    Which three statistics does the Executive report summarize?() (Choose three.)

    • A、latency and loss
    • B、compression results
    • C、traffic (by application)
    • D、CRC and alignment errors
    • E、user access (by username)

    正确答案:A,B,C

  • 第4题:

    What are two reasons that a network administrator would use access lists? (Choose two.) ()。

    • A、to control vty access into a router  
    • B、to control broadcast traffic through a router  
    • C、to filter traffic as it passes through a router  
    • D、to filter traffic that originates from the router  
    • E、to replace passwords as a line of defense against security incursions 

    正确答案:A,C

  • 第5题:

    What are three configuration objects used to build Junos IDP rules? ()(Choose three.)

    • A、zone objects
    • B、policy objects
    • C、attack objects
    • D、alert and notify objects
    • E、network and address objects

    正确答案:A,C,E

  • 第6题:

    What are three characteristics of a service tunnel? ()(Choose three.)

    • A、It is bidirectional.
    • B、It carries optimized traffic.
    • C、It can carry traffic using UDP.
    • D、It is formed only within a community

    正确答案:B,C,D

  • 第7题:

    What are three WAN reports that can be generated with the WX device?() (Choose three.)

    • A、throughput
    • B、performance
    • C、pass-through
    • D、application summary
    • E、packet size distribution

    正确答案:A,B,D

  • 第8题:

    多选题
    What are three characteristics of a service tunnel? ()(Choose three.)
    A

    It is bidirectional.

    B

    It carries optimized traffic.

    C

    It can carry traffic using UDP.

    D

    It is formed only within a community


    正确答案: B,C
    解析: 暂无解析

  • 第9题:

    多选题
    What are three ways an IP interface can be assigned to a virtual router in a PPP over ATM environment? ()(Choose three.)
    A

    profile

    B

    policy list

    C

    domain map

    D

    RADIUS VSA

    E

    classifier ACL


    正确答案: A,C,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)
    A

    routing-instance

    B

    zone

    C

    interface

    D

    policy

    E

    rule-set


    正确答案: E,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which three of these items are found within the router advertisement message of IPv6 stateless autoconfiguration?() (Choose three.)
    A

    flags indicating the kind of autoconfiguration that can be done by hosts

    B

    default router information

    C

    /64 prefix that can be used on the link and the lifetime of the prefix

    D

    IPv6 DHCP server address information


    正确答案: C,A
    解析: 暂无解析

  • 第12题:

    多选题
    What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。
    A

    protocol

    B

    VLAN number

    C

    TCP or UDP port numbers

    D

    source switch port number

    E

    source IP address and destination IP address

    F

    source MAC address and destination MAC address


    正确答案: F,B
    解析: 暂无解析

  • 第13题:

    An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。

    • A、FTP
    • B、Telnet
    • C、SMTP
    • D、DNS
    • E、HTTP
    • F、POP3

    正确答案:D,E,F

  • 第14题:

    What are three pieces of information that the Cisco IOS show inventory command displays on a Cisco ISR Router? ()(Choose three.)

    • A、Installed Hardware serial numbers
    • B、The status of installed hardware
    • C、Installed hardware
    • D、Unique Device Identifier
    • E、system internal temperature
    • F、main power supply condition

    正确答案:A,C,D

  • 第15题:

    What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

    • A、protocol
    • B、VLAN number
    • C、TCP or UDP port numbers
    • D、source switch port number
    • E、source IP address and destination IP address
    • F、source MAC address and destination MAC address

    正确答案:A,C,E

  • 第16题:

    An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()

    • A、FTP
    • B、Telnet
    • C、SMTP
    • D、DNS
    • E、HTTP
    • F、POP3

    正确答案:D,E,F

  • 第17题:

    Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)

    • A、routing-instance
    • B、zone
    • C、interface
    • D、policy
    • E、rule-set

    正确答案:A,B,C

  • 第18题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    • A、access profile
    • B、client group
    • C、client
    • D、default profile
    • E、external

    正确答案:A,B,C

  • 第19题:

    多选题
    What are three pieces of information that the Cisco IOS show inventory command displays on a Cisco ISR Router? ()(Choose three.)
    A

    Installed Hardware serial numbers

    B

    The status of installed hardware

    C

    Installed hardware

    D

    Unique Device Identifier

    E

    system internal temperature

    F

    main power supply condition


    正确答案: C,A
    解析: 暂无解析

  • 第20题:

    多选题
    What are three WAN reports that can be generated with the WX device?() (Choose three.)
    A

    throughput

    B

    performance

    C

    pass-through

    D

    application summary

    E

    packet size distribution


    正确答案: A,B
    解析: 暂无解析

  • 第21题:

    多选题
    An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()
    A

    FTP

    B

    Telnet

    C

    SMTP

    D

    DNS

    E

    HTTP

    F

    POP3


    正确答案: B,E
    解析: 暂无解析

  • 第22题:

    多选题
    An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。
    A

    FTP

    B

    Telnet

    C

    SMTP

    D

    DNS

    E

    HTTP

    F

    POP3


    正确答案: B,C
    解析: 暂无解析

  • 第23题:

    多选题
    What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
    A

    zone objects

    B

    policy objects

    C

    attack objects

    D

    alert and notify objects

    E

    network and address objects


    正确答案: E,D
    解析: 暂无解析