A. You should place standard ACLS as close as possible to the source of traffic to be denied.
B. You should place extended ACLS as close as possible to the source of traffic to be denied.
C. You should place standard ACLS as close as possible to the destination of traffic to be denied.
D. You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.
第1题:
You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()
第2题:
Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()
第3题:
Which of these is true regarding the configuration and application of port access control lists? ()
第4题:
What are two steps needed to define a QoS policy for a traffic class?()
第5题:
What are two reasons that a network administrator would use access lists? (Choose two.) ()。
第6题:
In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()
第7题:
You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()
第8题:
protocol list
MIME
block list
extension
第9题:
Application of up to three access lists per protocol to a single interface.
No more than two access lists per interface.
One access list may be configured per direction for each Layer 3 protocol configured on an interface.
The maximum number allowed varies due to RAM availability in the router.
An infinite number of access lists that can be applied to an interface, from most specific to most general.
Cisco IOS allows only one access list to an interface.
第10题:
You should place standard ACLS as close as possible to the source of traffic to be denied.
You should place extended ACLS as close as possible to the source of traffic to be denied.
You should place standard ACLS as close as possible to the destination of traffic to be denied.
You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.
第11题:
show access-list
show ip access-list
show ip interface
show interface
show interface list
第12题:
Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.
Configure pNAT to ensure Voice over IP packets are properly translated.
Configure IOS firewall to permit RTP port numbers through the firewall via VPN.
Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.
第13题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第14题:
What are two step needed to define a QoS policy for a traffic class?()
第15题:
Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()
第16题:
Which command is used to display the placement and direction of an IP access control list on a router?()
第17题:
What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()
第18题:
You need to design a PKI that meets business requirements. What should you do?()
第19题:
show access-list
show ip route
show ip interface
show interface
show interface list
show ip interface brief
第20题:
show interface list
show ip route
show ip interface
show ip interface brief
show interface
第21题:
more access points than a data network
fewer access points than a data network
less SNR than a data network
specific relative access point placement
第22题:
IP
ICMP
TCP
UDP
第23题:
The best match of the ACL entries will be used for granularity of control.
They use source IP information for matching operations.
They use source and destination IP information for matching operations.
They use source IP information along with protocol-type information for finer granularity of control.
第24题:
little
short
scarce
rare