A.destination address and wildcard mask
B.source address and wildcard mask
C.destination address and subnet mask
D.source address and subnet mask
第1题:
Which of the following are characteristics of named access lists?()
第2题:
Which two statements apply to dynamic access lists?()
第3题:
Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()
第4题:
On which options are standard access list based?()
第5题:
On which options are standard access lists based?()
第6题:
You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()
第7题:
Individual statements in a named access list may be deleted.
They require a numbered range from 1000 to 1099.
When created, they must be specified as standard or extended.
They are created with the ip access-list command.
The entire access list must be deleted before editing.
They are applied with the ip name-group command.
第8题:
FIFO queuing is only appropriate for slower serial interfaces
weighted fair queuing is the default queuing mechanism used for all but slower than E1 rate interfaces
only one queuing mechanism type can be applied to an interface
weighted fair queuing does not require the configuration of access lists to classify traffic
flow-based weighted fair queuing provides for queues to be serviced in a round-robin fashion
第9题:
they offer simpler management in large internetworks.
you can control logging messages.
they allow packets to be filtered based on upper-layer session information.
you can set a time-based security policy.
they provide a level of security against spoofing.
they are used to authenticate individual users.
第10题:
Criterion-referenced
Norm-referenced
Summative
Diagnostic
第11题:
you can apply multiple access lists with the same protocol or in different direction.
you can config one access list,per direction,per layer 3 protocol
you can place as many access lists as you want on any interface
you can apply only one access list on any interface
第12题:
Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()
第13题:
Which of the following options are valid choices for cluster communication security?()
第14题:
Which command shows if an access list is assigned to an interface?()
第15题:
Which two statements about the Wi-Fi Multimedia (WMM) standard are true?()
第16题:
Which statement about access lists that are applied to an interface is true?()
第17题:
Mobility Services Engine
WLAN controller
Cisco Wireless Control System
rugged/exterior access points
interior access points
第18题:
Application of up to three access lists per protocol to a single interface.
No more than two access lists per interface.
One access list may be configured per direction for each Layer 3 protocol configured on an interface.
The maximum number allowed varies due to RAM availability in the router.
An infinite number of access lists that can be applied to an interface, from most specific to most general.
Cisco IOS allows only one access list to an interface.
第19题:
they offer simpler management in large internetworks.
you can control logging messages.
they allow packets to be filtered based on upper-layer session information.
you can set a time-based security policy.
they provide a level of security against spoofing.
they are used to authenticate individual users
第20题:
you can apply multiple access lists with the same protocol or in different…
you can config one access list,per direction,per layer 3 protocol
you can placeasmanyaccess lists as you want on any interface
you can apply ony one access list on any interface
第21题:
clients connected to the rogue access point must be able to connect to the containment controller-based access point.
multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.
clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.
each controller-based access point can handle only a limited amount of clients connected to the rogue access points.
第22题:
You can delete individual statements in a named access list
Named access lists require a numbered range from 1000 to 1099.
Named access lists must be specified as standard or extended.
You can use the ip access-list command to create named access lists.
You cannot delete individual statements in a named access list.
You can use the ip name-group command to apply named access lists.