网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

A.protocol

B.VLAN number

C.TCP or UDP port numbers

D.source switch port number

E.source IP address and destination IP address

F.source MAC address and destination MAC address


参考答案

更多 “ What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。 A.protocolB.VLAN numberC.TCP or UDP port numbersD.source switch port numberE.source IP address and destination IP addressF.source MAC address and destination MAC address ” 相关考题
考题 Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.) A. routing-instanceB. zoneC. interfaceD. policyE. rule-set

考题 Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.) A. access profileB. client groupC. clientD. default profileE. external

考题 What are three characteristics of a service tunnel? ()(Choose three.) A. It is bidirectional.B. It carries optimized traffic.C. It can carry traffic using UDP.D. It is formed only within a community

考题 Which three statistics does the Executive report summarize?() (Choose three.) A. latency and lossB. compression resultsC. traffic (by application)D. CRC and alignment errorsE. user access (by username)

考题 What are the three main parts of a syslog message? ()(Choose three.)A、severity levelB、facilityC、log message nameD、time stampE、error codesF、access privilege

考题 An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。A、FTPB、TelnetC、SMTPD、DNSE、HTTPF、POP3

考题 What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions

考题 What are three pieces of information that the Cisco IOS show inventory command displays on a Cisco ISR Router? ()(Choose three.)A、Installed Hardware serial numbersB、The status of installed hardwareC、Installed hardwareD、Unique Device IdentifierE、system internal temperatureF、main power supply condition

考题 Which three statistics does the Executive report summarize?() (Choose three.)A、latency and lossB、compression resultsC、traffic (by application)D、CRC and alignment errorsE、user access (by username)

考题 What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A、protocolB、VLAN numberC、TCP or UDP port numbersD、source switch port numberE、source IP address and destination IP addressF、source MAC address and destination MAC address

考题 What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router  B、to control broadcast traffic through a router  C、to filter traffic as it passes through a router  D、to filter traffic that originates from the router  E、to replace passwords as a line of defense against security incursions 

考题 An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()A、FTPB、TelnetC、SMTPD、DNSE、HTTPF、POP3

考题 What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects

考题 Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)A、routing-instanceB、zoneC、interfaceD、policyE、rule-set

考题 What are three characteristics of a service tunnel? ()(Choose three.)A、It is bidirectional.B、It carries optimized traffic.C、It can carry traffic using UDP.D、It is formed only within a community

考题 Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)A、access profileB、client groupC、clientD、default profileE、external

考题 What are three WAN reports that can be generated with the WX device?() (Choose three.)A、throughputB、performanceC、pass-throughD、application summaryE、packet size distribution

考题 多选题What are three pieces of information that the Cisco IOS show inventory command displays on a Cisco ISR Router? ()(Choose three.)AInstalled Hardware serial numbersBThe status of installed hardwareCInstalled hardwareDUnique Device IdentifierEsystem internal temperatureFmain power supply condition

考题 多选题What are three characteristics of a service tunnel? ()(Choose three.)AIt is bidirectional.BIt carries optimized traffic.CIt can carry traffic using UDP.DIt is formed only within a community

考题 多选题What are three WAN reports that can be generated with the WX device?() (Choose three.)AthroughputBperformanceCpass-throughDapplication summaryEpacket size distribution

考题 多选题What are three ways an IP interface can be assigned to a virtual router in a PPP over ATM environment? ()(Choose three.)AprofileBpolicy listCdomain mapDRADIUS VSAEclassifier ACL

考题 多选题An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()AFTPBTelnetCSMTPDDNSEHTTPFPOP3

考题 多选题Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)Arouting-instanceBzoneCinterfaceDpolicyErule-set

考题 多选题An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。AFTPBTelnetCSMTPDDNSEHTTPFPOP3

考题 多选题Which three of these items are found within the router advertisement message of IPv6 stateless autoconfiguration?() (Choose three.)Aflags indicating the kind of autoconfiguration that can be done by hostsBdefault router informationC/64 prefix that can be used on the link and the lifetime of the prefixDIPv6 DHCP server address information

考题 多选题What are three configuration objects used to build Junos IDP rules? ()(Choose three.)Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects

考题 多选题What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。AprotocolBVLAN numberCTCP or UDP port numbersDsource switch port numberEsource IP address and destination IP addressFsource MAC address and destination MAC address