网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which command is required to apply an access list on a virtual terminal line of a router?()
A
Router(config-line)# access-class 10 in
B
Router(config-if)# ip access-class 23 out
C
Router(config-line)# access-group 15 out
D
Router(config-if)# ip access-group 110 in
E
Router(config-line)# access-list 150 in
F
Router(config-if)# ip access-list 128 out
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which command is required to apply an access list on a virtual terminal line of a router?()A Router(config-line)# access-class 10 inB Router(config-if)# ip access-class 23 outC Router(config-line)# access-group 15 outD Router(config-if)# ip access-group 110 inE Router(config-line)# access-list 150 inF Router(config-if)# ip access-list 128 out” 相关考题
考题
On a Cisco Catalyst switch, which configuration command is used to apply a VACL named "test"to filter the traffic within VLAN100? ()
A. interface vlan 100 ip access-group testB. interface vlan 100 ip access-group test inC. interface vlan 100 ip access-group test outD. vlan filter test vlan-list 100E. vlan access-map test 100
考题
Which command is required to apply an access list on a virtual terminal line of a router?()
A. Router(config-line)# access-class 10 inB. Router(config-if)# ip access-class 23 outC. Router(config-line)# access-group 15 outD. Router(config-if)# ip access-group 110 inE. Router(config-line)# access-list 150 inF. Router(config-if)# ip access-list 128 out
考题
You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A. show access-listB. show ip access-listC. show ip interfaceD. show interfaceE. show interface list
考题
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()
A. permit access-list 101 outB. ip access-group 101 outC. apply access-list 101 outD. access-class 101 outE. ip access-list e0 out
考题
You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()
A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
考题
Which of the following answer choices are correct characteristics of named access list?()
A. You can delete individual statements in a named access listB. Named access lists require a numbered range from 1000 to 1099.C. Named access lists must be specified as standard or extended.D. You can use the ip access-list command to create named access lists.E. You cannot delete individual statements in a named access list.F. You can use the ip name-group command to apply named access lists.
考题
What can be done to secure the virtual terminal interfaces on a router?()
A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
考题
Which statement about access lists that are applied to an interface is true?()
A.you can apply multiple access lists with the same protocol or in different…B.you can config one access list,per direction,per layer 3 protocolC.you can placeasmanyaccess lists as you want on any interfaceD.you can apply ony one access list on any interface
考题
Which of the following are characteristics of named access lists?()A、Individual statements in a named access list may be deleted.B、They require a numbered range from 1000 to 1099.C、When created, they must be specified as standard or extended.D、They are created with the ip access-list command.E、The entire access list must be deleted before editing.F、They are applied with the ip name-group command.
考题
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A、permit access-list 101 outB、ip access-group 101 outC、apply access-list 101 outD、access-class 101 outE、ip access-list e0 out
考题
Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-groupc ommand.
考题
You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A、show access-listB、show ip access-listC、show ip interfaceD、show interfaceE、show interface list
考题
Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command
考题
Which command is required to apply an access list on a virtual terminal line of a router?()A、Router(config-line)# access-class 10 inB、Router(config-if)# ip access-class 23 outC、Router(config-line)# access-group 15 outD、Router(config-if)# ip access-group 110 inE、Router(config-line)# access-list 150 inF、Router(config-if)# ip access-list 128 out
考题
Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command.
考题
What can be done to secure the virtual terminal interfaces on a router? ()A、Administratively shut down the interface.B、Physically secure the interface.C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.D、Configure a virtual terminal password and login process.E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
考题
Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different…B、you can config one access list,per direction,per layer 3 protocolC、you can place as many access lists as you want on any interfaceD、you can apply ony one access list on any interface
考题
多选题Which of the following are characteristics of named access lists?()AIndividual statements in a named access list may be deleted.BThey require a numbered range from 1000 to 1099.CWhen created, they must be specified as standard or extended.DThey are created with the ip access-list command.EThe entire access list must be deleted before editing.FThey are applied with the ip name-group command.
考题
单选题You are maintaining your database in Oracle10g. You are required to view the list of files that have not been backed up for the last seven days. Which RMAN command will you use?()A
LIST commandB
CROSSCHECK commandC
REPORT commandD
SHOW command
考题
多选题You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()AAdministratively shut down the interface.BPhysically secure the interface.CCreate an access list and apply it to the virtual terminal interfaces with the access-group command.DConfigure a virtual terminal password and login process.EEnter an access list and apply it to the virtual terminal interfaces using the access-class command.
考题
单选题Which statement about access lists that are applied to an interface is true?()A
you can apply multiple access lists with the same protocol or in different…B
you can config one access list,per direction,per layer 3 protocolC
you can placeasmanyaccess lists as you want on any interfaceD
you can apply ony one access list on any interface
考题
单选题You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A
show access-listB
show ip access-listC
show ip interfaceD
show interfaceE
show interface list
考题
多选题Which can be done to secure the virtual terminal interfaces on a router?()AAdministratively shut down the interfaces.BPhysically secure the interfaces.CConfigure a virtual terminal password and login process.DEnter an access list and apply it to the terminal interfaces using the access-class command.ECreate an access list and apply it to the terminal interfaces using the access-groupc ommand.
考题
单选题Which statement about access lists that are applied to an interface is true?()A
you can apply multiple access lists with the same protocol or in different direction.B
you can config one access list,per direction,per layer 3 protocolC
you can place as many access lists as you want on any interfaceD
you can apply only one access list on any interface
考题
多选题Which of the following answer choices are correct characteristics of named access list?()AYou can delete individual statements in a named access listBNamed access lists require a numbered range from 1000 to 1099.CNamed access lists must be specified as standard or extended.DYou can use the ip access-list command to create named access lists.EYou cannot delete individual statements in a named access list.FYou can use the ip name-group command to apply named access lists.
考题
单选题On a Cisco Catalyst switch, which configuration command is used to apply a VACL named "test"to filter the traffic within VLAN100? ()A
interface vlan 100 ip access-group testB
interface vlan 100 ip access-group test inC
interface vlan 100 ip access-group test outD
vlan filter test vlan-list 100E
vlan access-map test 100
考题
单选题You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A
permit access-list 101 outB
ip access-group 101 outC
apply access-list 101 outD
access-class 101 outE
ip access-list e0 out
热门标签
最新试卷