What are some general guidelines regarding the placement of access control lists?()A. You should place standard ACLS as close as possible to the source of traffic to be denied.B. You should place extended ACLS as close as possible to the source of traffic

题目
What are some general guidelines regarding the placement of access control lists?()

A. You should place standard ACLS as close as possible to the source of traffic to be denied.

B. You should place extended ACLS as close as possible to the source of traffic to be denied.

C. You should place standard ACLS as close as possible to the destination of traffic to be denied.

D. You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.


相似考题
参考答案和解析
参考答案:B, C
更多“What are some general guidelines regarding the placement of access control lists?() ”相关问题
  • 第1题:

    You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()

    • A、show access-list
    • B、show ip access-list
    • C、show ip interface
    • D、show interface
    • E、show interface list

    正确答案:C

  • 第2题:

    Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()

    • A、Application of up to three access lists per protocol to a single interface.
    • B、No more than two access lists per interface.
    • C、One access list may be configured per direction for each Layer 3 protocol configured on an interface.
    • D、The maximum number allowed varies due to RAM availability in the router.
    • E、An infinite number of access lists that can be applied to an interface, from most specific to most general.
    • F、Cisco IOS allows only one access list to an interface.

    正确答案:C

  • 第3题:

    Which of these is true regarding the configuration and application of port access control lists? ()

    • A、PACLs can be applied in the inbound or outbound direction of a Layer 2 physical interface. 
    • B、At Layer 2, a MAC address PACL will take precedence over any existing Layer 3 PACL.
    • C、When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port.
    • D、PACLs are not supported on EtherChannel interfaces.

    正确答案:D

  • 第4题:

    What are two steps needed to define a QoS policy for a traffic class?()

    • A、 Determine a minimum bandwidth guarantee.
    • B、 Determine interfaces to which to apply policy.
    • C、 Assign priorities to the class.
    • D、 Configure access control lists.

    正确答案:A,C

  • 第5题:

    What are two reasons that a network administrator would use access lists? (Choose two.) ()。

    • A、to control vty access into a router  
    • B、to control broadcast traffic through a router  
    • C、to filter traffic as it passes through a router  
    • D、to filter traffic that originates from the router  
    • E、to replace passwords as a line of defense against security incursions 

    正确答案:A,C

  • 第6题:

    In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()

    • A、to specify the destination addresses to which access is permitted
    • B、to specify the source address permitted to access the resource
    • C、to specify the services to which access is permitted
    • D、to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

    正确答案:D

  • 第7题:

    You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()

    • A、Use Windows directory service mapper and enable Microsoft .NET Passport authentication
    • B、Create authorization rules and scopes by using Authorization Manager
    • C、Use one-to-many client certificate mapping
    • D、Define permissions by using access control lists (ACLs)

    正确答案:B

  • 第8题:

    多选题
    Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)
    A

    protocol list

    B

    MIME

    C

    block list

    D

    extension


    正确答案: A,B
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()
    A

    Application of up to three access lists per protocol to a single interface.

    B

    No more than two access lists per interface.

    C

    One access list may be configured per direction for each Layer 3 protocol configured on an interface.

    D

    The maximum number allowed varies due to RAM availability in the router.

    E

    An infinite number of access lists that can be applied to an interface, from most specific to most general.

    F

    Cisco IOS allows only one access list to an interface.


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    What are some general guidelines regarding the placement of access control lists?()
    A

    You should place standard ACLS as close as possible to the source of traffic to be denied.

    B

    You should place extended ACLS as close as possible to the source of traffic to be denied.

    C

    You should place standard ACLS as close as possible to the destination of traffic to be denied.

    D

    You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.


    正确答案: B,A
    解析: 暂无解析

  • 第11题:

    单选题
    You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()
    A

    show access-list

    B

    show ip access-list

    C

    show ip interface

    D

    show interface

    E

    show interface list


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
    A

    Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.

    B

    Configure pNAT to ensure Voice over IP packets are properly translated.

    C

    Configure IOS firewall to permit RTP port numbers through the firewall via VPN. 

    D

    Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第14题:

    What are two step needed to define a QoS policy for a traffic class?()

    • A、determine a minimum bandwidth guarantee
    • B、determine interfaces to which to apply policy
    • C、assign priorities to the class
    • D、configure access control lists

    正确答案:A,C

  • 第15题:

    Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()

    • A、show interface list
    • B、show ip route
    • C、show ip interface
    • D、show ip interface brief
    • E、show interface

    正确答案:C

  • 第16题:

    Which command is used to display the placement and direction of an IP access control list on a router?()

    • A、show access-list
    • B、show ip route
    • C、show ip interface
    • D、show interface
    • E、show interface list
    • F、show ip interface brief

    正确答案:C

  • 第17题:

    What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()

    • A、The best match of the ACL entries will be used for granularity of control.
    • B、They use source IP information for matching operations.
    • C、They use source and destination IP information for matching operations.
    • D、They use source IP information along with protocol-type information for finer granularity of control.

    正确答案:B

  • 第18题:

    You need to design a PKI that meets business requirements. What should you do?()

    • A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificates
    • B、Create a stand-alone subordinate CA to issue certificates
    • C、Use a qualified subordinate CA
    • D、Configure certificate template access control lists (ACLs) on ATLCA1

    正确答案:A

  • 第19题:

    单选题
    Which command is used to display the placement and direction of an IP access control list on a router?()
    A

    show access-list

    B

    show ip route

    C

    show ip interface

    D

    show interface

    E

    show interface list

    F

    show ip interface brief


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()
    A

    show interface list

    B

    show ip route

    C

    show ip interface

    D

    show ip interface brief

    E

    show interface


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    What does a Cisco Unified Wireless IP Phone 7921G deployment require()?
    A

    more access points than a data network

    B

    fewer access points than a data network

    C

    less SNR than a data network

    D

    specific relative access point placement


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()
    A

    IP

    B

    ICMP

    C

    TCP

    D

    UDP


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()
    A

    The best match of the ACL entries will be used for granularity of control.

    B

    They use source IP information for matching operations.

    C

    They use source and destination IP information for matching operations.

    D

    They use source IP information along with protocol-type information for finer granularity of control.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Some cable services offer 1.5 megabyte or higher access for as ______ as $40 a month, but there are some restrictions regarding service.
    A

    little

    B

    short

    C

    scarce

    D

    rare


    正确答案: C
    解析:
    句意:一些光缆提供l. 5兆字节或更快速的访问服务,而每月仅收取40美元,但服务上有些限制。此处表示“钱数不多”,用little。scarce缺乏的,不足的。rare罕见的,很少发生的。short不足的。