A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A.acce

题目

A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()

A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255

B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255

C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255

D.access-list 10 permit ip 192.168.146.0 0.0.1.255

E.access-list 10 permit ip 192.168.148.0 0.0.1.255

F.access-list 10 permit ip 192.168.146.0 255.255.255.0


相似考题
更多“A network administrator is configuring ACLs on a cisco router, to allow affic from hosts ”相关问题
  • 第1题:

    A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task?()

    A.

    B.

    C.

    D.


    参考答案:C

  • 第2题:

    A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()

    A.

    B.

    C.

    D.


    参考答案:B

  • 第3题:

    The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to router) basis?()

    • A、nGenius Real-Time Monitor
    • B、Cisco View
    • C、Device Fault Manager
    • D、Internetwork Performance Monitor

    正确答案:D

  • 第4题:

    After working all night and successfully configuring a Cisco router for the TestKing network you save your changes on the startup config, reboot the router, and go out for a cigarette. When you return, none of your changes are active and the router boots to the initial configuration mode! Which of the choices below indicates the source of your problem?()

    • A、Hardware failure in NVRAM prevents the router from loading the config
    • B、Startup-config in flash is corrupt and cannot be analyzed
    • C、Router configuration-register set to bypass startup configuration
    • D、Startup-config in NVRAM is corrupt and cannot be analyzed
    • E、None of the above

    正确答案:C

  • 第5题:

    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

    • A、BPDU
    • B、Port security
    • C、RSTP
    • D、STP
    • E、VTP
    • F、Blocking mode

    正确答案:B

  • 第6题:

    On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()

    • A、a router with subinterfaces configured on the physical interface that is connected to the switch
    • B、a router with an IP address on the physical interface connected to the switch
    • C、a switch with an access link that is configured between the switches
    • D、a switch with a trunk link that is configured between the switches

    正确答案:A

  • 第7题:

    多选题
    A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
    A

    access-list 10 permit ip 192.168.147.0 0.0.0.255.255

    B

    access-list 10 permit ip 192.168.149.0 0.0.0.255.255

    C

    access-list 10 permit ip 192.168.146.0 0.0.0.0.255

    D

    access-list 10 permit ip 192.168.146.0 0.0.1.255

    E

    access-list 10 permit ip 192.168.148.0 0.0.1.255

    F

    access-list 10 permit ip 192.168.146.0 255.255.255.0


    正确答案: F,C
    解析: 暂无解析

  • 第8题:

    单选题
    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
    A

    STP

    B

    GVRP

    C

    SNMP

    D

    VTP

    E

    DHCP


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following should an administrator do after running a command from the console onthe perimeter router?()
    A

    Update the configuration logs

    B

    Update the network wiring schematics

    C

    Update the network configuration procedures

    D

    Compare the configuration with the baseline


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
    A

    Port security needs to be globally enabled.

    B

    Port security needs to be enabled on the interface.

    C

    Port security needs to be configured to shut down the interface in the event of a violation.

    D

    Port security needs to be configured to allow only one learned MAC address.

    E

    Port security interface counters need to be cleared before using the show command.

    F

    The port security configuration needs to be saved to NVRAM before it can become active.


    正确答案: E,B
    解析: 暂无解析

  • 第11题:

    单选题
    For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()
    A

    IP

    B

    ICMP

    C

    TCP

    D

    UDP


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Refer to the exhibit. A network administrator configures a new router and enters the copy startup-config running-config on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enter the system configuration dialog as shown. What is the caust of the problem?()
    A

    The network administrator faled to save the configuration.

    B

    The configuration register is set to 0x2100.

    C

    The boot system flash command is missing from the configuration.

    D

    The configuraiton register is set to 0x2102.

    E

    The router is configured with the boot system startup command.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。

    A.IP

    B.ICMP

    C.TCP

    D.UDP


    参考答案:B

  • 第14题:

    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

    • A、STP
    • B、GVRP
    • C、SNMP
    • D、VTP
    • E、DHCP

    正确答案:D

  • 第15题:

    A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()

    • A、access-list 10 permit ip 192.168.147.0 0.0.0.255.255
    • B、access-list 10 permit ip 192.168.149.0 0.0.0.255.255
    • C、access-list 10 permit ip 192.168.146.0 0.0.0.0.255
    • D、access-list 10 permit ip 192.168.146.0 0.0.1.255
    • E、access-list 10 permit ip 192.168.148.0 0.0.1.255
    • F、access-list 10 permit ip 192.168.146.0 255.255.255.0

    正确答案:D,E

  • 第16题:

    A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()

    • A、access-list 10 permit ip 192.168.147.0 0.0.0.255.255 
    • B、access-list 10 permit ip 192.168.149.0 0.0.0.255.255
    • C、access-list 10 permit ip 192.168.146.0 0.0.0.0.255
    • D、access-list 10 permit ip 192.168.146.0 0.0.0.1.255
    • E、access-list 10 permit ip 192.168.148.0 0.0.0.1.255
    • F、access-list 10 permit ip 192.168.146.0 255.255.255.0

    正确答案:D,E

  • 第17题:

    What are two reasons that a network administrator would use access lists? (Choose two.) ()。

    • A、to control vty access into a router  
    • B、to control broadcast traffic through a router  
    • C、to filter traffic as it passes through a router  
    • D、to filter traffic that originates from the router  
    • E、to replace passwords as a line of defense against security incursions 

    正确答案:A,C

  • 第18题:

    Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()

    • A、WPA-PSK encryption
    • B、SSID broadcast
    • C、Port forwarding
    • D、MAC filtering

    正确答案:A

  • 第19题:

    单选题
    After working all night and successfully configuring a Cisco router for the TestKing network you save your changes on the startup config, reboot the router, and go out for a cigarette. When you return, none of your changes are active and the router boots to the initial configuration mode! Which of the choices below indicates the source of your problem?()
    A

    Hardware failure in NVRAM prevents the router from loading the config

    B

    Startup-config in flash is corrupt and cannot be analyzed

    C

    Router configuration-register set to bypass startup configuration

    D

    Startup-config in NVRAM is corrupt and cannot be analyzed

    E

    None of the above


    正确答案: D
    解析: 暂无解析

  • 第20题:

    多选题
    A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
    A

    access-list 10 permit ip 192.168.147.0 0.0.0.255.255 

    B

    access-list 10 permit ip 192.168.149.0 0.0.0.255.255

    C

    access-list 10 permit ip 192.168.146.0 0.0.0.0.255

    D

    access-list 10 permit ip 192.168.146.0 0.0.0.1.255

    E

    access-list 10 permit ip 192.168.148.0 0.0.0.1.255

    F

    access-list 10 permit ip 192.168.146.0 255.255.255.0


    正确答案: E,B
    解析: 暂无解析

  • 第21题:

    单选题
    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
    A

    BPDU

    B

    Port security

    C

    RSTP

    D

    STP

    E

    VTP

    F

    Blocking mode


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()
    A

    a router with subinterfaces configured on the physical interface that is connected to the switch

    B

    a router with an IP address on the physical interface connected to the switch

    C

    a switch with an access link that is configured between the switches

    D

    a switch with a trunk link that is configured between the switches


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()
    A

    nGenius Real-Time Monitor

    B

    CiscoView

    C

    Device Fault Manager

    D

    Internetwork Performance Monitor


    正确答案: A
    解析: 暂无解析