A.you can apply multiple access lists with the same protocol or in different…
B.you can config one access list,per direction,per layer 3 protocol
C.you can placeasmanyaccess lists as you want on any interface
D.you can apply ony one access list on any interface
第1题:
Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()
第2题:
Which statement is true about terms in a policy?()
第3题:
Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()
第4题:
Which command shows if an access list is assigned to an interface?()
第5题:
Which two statements about static NAT translations are true?()
第6题:
Which statement about PPPoA configuration is correct?()
第7题:
Which statement is TRUE about the CacheFactory class ?()
第8题:
The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.
The ACL is applied to the Telnet port with the ip access-group command.
The ACL must be applied to each vty line individually.
The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.
第9题:
it is a topology agnostic way to access NamedCaches
it provides mechanisms to manage underlying remote data sources
both A and B are TRUE
Neither A nor B are TRUE
第10题:
you can apply multiple access lists with the same protocol or in different direction.
you can config one access list,per direction,per layer 3 protocol
you can place as many access lists as you want on any interface
you can apply only one access list on any interface
第11题:
A single term can be applied to a protocol or interface, independent of the policy.
Once configured, terms within a policy cannot be reordered.
The name of a term is limited to five characters.
A from statement is optional in a term.
第12题:
The data traffic between the access point and controller is not encrypted.
The data traffic is encapsulated with LWAPP.
The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.
The data traffic is encrypted with AES.
All of the above
第13题:
Which statement is true about terms in a policy?()
第14题:
Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()
第15题:
Which three statements about IOS Firewall configurations are true?()
第16题:
Which of these is true regarding the configuration and application of port access control lists? ()
第17题:
What is true about access control on bridged and routed VLAN traffic? ()
第18题:
Which statement about access lists that are applied to an interface is true?()
第19题:
Application of up to three access lists per protocol to a single interface.
No more than two access lists per interface.
One access list may be configured per direction for each Layer 3 protocol configured on an interface.
The maximum number allowed varies due to RAM availability in the router.
An infinite number of access lists that can be applied to an interface, from most specific to most general.
Cisco IOS allows only one access list to an interface.
第20题:
The IP inspection rule can be applied in the inbound direction on the secured interface.
The IP inspection rule can be applied in the outbound direction on the unsecured interface.
The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.
The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.
For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.
For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.
第21题:
you can apply multiple access lists with the same protocol or in different…
you can config one access list,per direction,per layer 3 protocol
you can placeasmanyaccess lists as you want on any interface
you can apply ony one access list on any interface
第22题:
They are always present in the NATt able.
They allow connection to be initiated from the outside.
They can be configured with access lists,to allow two or more connections to be initiated from the outside.
They require no inside or outside interface markings because addresses are statically defined.
第23题:
A single term can be applied to a protocol or interface, independent of the policy
Every policy must contain at least one term
The name of a term is limited to five characters
Terms are optional