Which of the following answer choices are correct characteristics of named access list?()A. You can delete individual statements in a named access listB. Named access lists require a numbered range from 1000 to 1099.C. Named access lists must be specified

题目
Which of the following answer choices are correct characteristics of named access list?()

A. You can delete individual statements in a named access list

B. Named access lists require a numbered range from 1000 to 1099.

C. Named access lists must be specified as standard or extended.

D. You can use the ip access-list command to create named access lists.

E. You cannot delete individual statements in a named access list.

F. You can use the ip name-group command to apply named access lists.


相似考题
更多“Which of the following answer choices are correct characteristics of named access list?() ”相关问题
  • 第1题:

    Which of the following answer choices is an additional parameter which must be supplied before the IGRP routing process can initialize?()

    A. Connected subnet numbers

    B. Register administrative subnet masks

    C. IP address mask

    D. Autonomous system number

    E. Metric weights


    参考答案:D

  • 第2题:

    As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()

    A.access-list 101 in

    B.access-list 101 out

    C.ip access-group 101 in

    D.ip access-group 101 out


    参考答案:C

  • 第3题:

    Which of the following are characteristics of named access lists?()

    • A、Individual statements in a named access list may be deleted.
    • B、They require a numbered range from 1000 to 1099.
    • C、When created, they must be specified as standard or extended.
    • D、They are created with the ip access-list command.
    • E、The entire access list must be deleted before editing.
    • F、They are applied with the ip name-group command.

    正确答案:A,C,D

  • 第4题:

    Which of the following answer choices are correct characteristics of named access list?()

    • A、You can delete individual statements in a named access list
    • B、Named access lists require a numbered range from 1000 to 1099.
    • C、Named access lists must be specified as standard or extended.
    • D、You can use the ip access-list command to create named access lists.
    • E、You cannot delete individual statements in a named access list.
    • F、You can use the ip name-group command to apply named access lists.

    正确答案:A,C,D

  • 第5题:

    Which of the following answer choices is an additional parameter which must be supplied before the IGRP routing process can initialize?()

    • A、Connected subnet numbers
    • B、Register administrative subnet masks
    • C、IP address mask
    • D、Autonomous system number
    • E、Metric weights

    正确答案:D

  • 第6题:

    With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()

    • A、IETF
    • B、PFC
    • C、TCAM
    • D、ASIC

    正确答案:B

  • 第7题:

    Which of the following is the correct command to list the filesystems in datavg?()

    • A、lsvg -p datavg
    • B、lsvg -l datavg
    • C、lsvg -L datavg
    • D、lsvg -o datavg

    正确答案:B

  • 第8题:

    单选题
    Which of the following commands would successfully implement an access list on a routers virtual terminal line?()
    A

    RouterTK(config-line)# access-class 10 in

    B

    RouterTK(config-if)# ip access-class 23 out

    C

    RouterTK(config-line)# access-list 150 in

    D

    RouterTK(config-if)# ip access-list 128 out

    E

    RouterTK(config-line)# access-group 15 out

    F

    RouterTK(config-if)# ip access-group 110 in


    正确答案: C
    解析: 暂无解析

  • 第9题:

    多选题
    Which of the following are characteristics of named access lists?()
    A

    Individual statements in a named access list may be deleted.

    B

    They require a numbered range from 1000 to 1099.

    C

    When created, they must be specified as standard or extended.

    D

    They are created with the ip access-list command.

    E

    The entire access list must be deleted before editing.

    F

    They are applied with the ip name-group command.


    正确答案: C,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL(Racl) is correct?()
    A

    CoPP protects against IP spoofing;Racl protects against DoS attacks.

    B

    CoPP can not use named access lists;Racl can use named access lists

    C

    CoPP applies to a dedicated control plane interface;Racl applies to all interfaces.

    D

    CoPP needs a AAA server,Racl does not need a AAA server

    E

    CoPP supports rate limits;Racl does not support rate limits


    正确答案: B,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which of the following answer choices are correct characteristics of named access list?()
    A

    You can delete individual statements in a named access list

    B

    Named access lists require a numbered range from 1000 to 1099.

    C

    Named access lists must be specified as standard or extended.

    D

    You can use the ip access-list command to create named access lists.

    E

    You cannot delete individual statements in a named access list.

    F

    You can use the ip name-group command to apply named access lists.


    正确答案: F,C
    解析: 暂无解析

  • 第12题:

    多选题
    If n = 6 × 15, which of the following are prime factors of n? (Indicate all of the answer choices that apply.)
    A

    2

    B

    3

    C

    7

    D

    9

    E

    15


    正确答案: C,A
    解析:
    因为n = 6×15=2×3×3×5,所以n的质因数为2, 3, 5,所以本题选AB。

  • 第13题:

    Which of the following access list statements would deny traffic from a specifichost?()

    A. Router(config)# access-list 1 deny 172.31.212.74 any

    B. Router(config)# access-list 1 deny 10.6.111.48 host

    C. Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0

    D. Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0

    E. Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255


    参考答案:C

  • 第14题:

    As a network administrator,you have been instructed to prevent all traffic or iginating on the LAN from entering the R2 router.Which the following command would implement the access list on the interface of theR2 router?()

    A.access-list 101 in

    B.access-list 101 out

    C.ipaccess-group 101 in

    D.ipaccess-group 101 out


    参考答案:C

  • 第15题:

    You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()

    • A、permit access-list 101 out
    • B、ip access-group 101 out
    • C、apply access-list 101 out
    • D、access-class 101 out
    • E、ip access-list e0 out

    正确答案:B

  • 第16题:

    Which of the following IOS commands can detect whether the SQL slammer virus propagates in yournetworks?()

    • A、access-list 100 permit any any udp eq 1434
    • B、access-list 100 permit any any udp eq 1434 log
    • C、access-list 110 permit any any udp eq 69
    • D、access-list 110 permit any any udp eq 69 log
    • E、None of above.

    正确答案:B

  • 第17题:

    Which of the following answer is correct to express the value 8 in octal number?()    

    • A、 010
    • B、 0x10
    • C、 08
    • D、 0x8

    正确答案:A

  • 第18题:

    As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()

    • A、access-list 101 in
    • B、access-list 101 out
    • C、ip access-group 101 in
    • D、ip access-group 101 out

    正确答案:C

  • 第19题:

    多选题
    Which of the following are factors of 240? (Indicate all of the answer choices that apply.)
    A

    6

    B

    9

    C

    12

    D

    20

    E

    36

    F

    45


    正确答案: A,D
    解析:
    将240分解质因子得到,240 = 24 × 10 = 6 × 4 × 10=2 × 3 × 2 × 2 × 5× 2,所以本题选择ACD三项。

  • 第20题:

    单选题
    Which of the following access list statements would deny traffic from a specifichost?()
    A

    Router(config)# access-list 1 deny 172.31.212.74 any

    B

    Router(config)# access-list 1 deny 10.6.111.48 host

    C

    Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0

    D

    Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0

    E

    Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255


    正确答案: E
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following answer is correct to express the value 8 in octal number?()
    A

     010

    B

     0x10

    C

     08

    D

     0x8


    正确答案: A
    解析: 八进制值以0开头,以0x开头的为十六进制值,八进制中不能出现数字8,最大只有7。

  • 第22题:

    单选题
    Which of the following answer choices is an additional parameter which must be supplied before the IGRP routing process can initialize?()
    A

    Connected subnet numbers

    B

    Register administrative subnet masks

    C

    IP address mask

    D

    Autonomous system number

    E

    Metric weights


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()
    A

    permit access-list 101 out

    B

    ip access-group 101 out

    C

    apply access-list 101 out

    D

    access-class 101 out

    E

    ip access-list e0 out


    正确答案: E
    解析: 暂无解析