A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
A. access-list 10 permit ip 192.168.147.0 0.0.0.255.255
B. access-list 10 permit ip 192.168.149.0 0.0.0.255.255
C. access-list 10 permit ip 192.168.146.0 0.0.0.0.255
D. access-list 10 permit ip 192.168.146.0 0.0.0.1.255
E. access-list 10 permit ip 192.168.148.0 0.0.0.1.255
F. access-list 10 permit ip 192.168.146.0 255.255.255.0
第1题:
A. The command establishes a static route
B. The command invokes a dynamic routing protocol for 192.168.12.0
C. Traffic for network 192.168.12.0 is forwarded to 172.16.12.1
D. Traffic for all networks is forwarded to 172.16.12.1
E. This route is automatically propagated throughout the entire network
F. Traffic for network 172.16.12.0 is forwarded to the 192.168.12.0 network
第2题:
A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()
A.
B.
C.
D.
第3题:
The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to router) basis?()
第4题:
A network administrator has configured access list 172 to prevent Telnet and ICMP traffic from reaching a server with the address if 192.168.13.26. Which command can the administrator issue to verify that the access list is working properly?()
第5题:
You need to decide on the best router redundancy protocol to use in the Company network. Which two statements are true about HSRP, VRRP, and GLBP?()
第6题:
What are two reasons that a network administrator would use access lists? (Choose two.) ()。
第7题:
What is true about access control on bridged and routed VLAN traffic?()
第8题:
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()
第9题:
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()
第10题:
All traffic will be allowed to exit E0 except FTP traffic.
FTP traffic from 192.168.166.19 to any host will be denied.
FTP traffic from 192.168.166.22 to any host will be denied.
All traffic exiting E0 will be denied.
All FTP traffic to network 192.168.166.18/29 from any host will be denied.
第11题:
nGenius Real-Time Monitor
CiscoView
Device Fault Manager
Internetwork Performance Monitor
第12题:
requires access lists to identify the voice traffic
can allow traffic from a device without 802.1X authentication, by MAC address
can allow traffic from Cisco IP phones by listening to their CDP advertisements
allows all packets marked with a ToS of 5 to bypass authentication
allows all IP voice packets to bypass authentication via stateful inspection
第13题:
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255
B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255
C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255
D.access-list 10 permit ip 192.168.146.0 0.0.1.255
E.access-list 10 permit ip 192.168.148.0 0.0.1.255
F.access-list 10 permit ip 192.168.146.0 255.255.255.0
第14题:
The network administrator of the Oregon router adds the follwing command to the router configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1. What are the results of adding this command?()
第15题:
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
第16题:
A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
第17题:
Which of the following are benefits provided with access control lists (ACLs)?()
第18题:
Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().
第19题:
An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()
第20题:
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
第21题:
access-list 10 permit ip 192.168.147.0 0.0.0.255.255
access-list 10 permit ip 192.168.149.0 0.0.0.255.255
access-list 10 permit ip 192.168.146.0 0.0.0.0.255
access-list 10 permit ip 192.168.146.0 0.0.1.255
access-list 10 permit ip 192.168.148.0 0.0.1.255
access-list 10 permit ip 192.168.146.0 255.255.255.0
第22题:
access-list 10 permit ip 192.168.147.0 0.0.0.255.255
access-list 10 permit ip 192.168.149.0 0.0.0.255.255
access-list 10 permit ip 192.168.146.0 0.0.0.0.255
access-list 10 permit ip 192.168.146.0 0.0.0.1.255
access-list 10 permit ip 192.168.148.0 0.0.0.1.255
access-list 10 permit ip 192.168.146.0 255.255.255.0
第23题:
nGenius Real-Time Monitor
CiscoView
Device Fault Manager
Internetwork Performance Monitor
第24题:
Router routes traffic between different networks and a switch does not
The new switch is faulty and needs to be replaced and configured correctly
The firewall needs to be setup to allow traffic to reach the Internet
The switch needs to be setup to forward data traffic to the Internet