网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which of the following is true of an ACL when a packet matching an ACE is found?()
- A、The matching ACE is skipped to allow all other ACEs to be examined.
- B、The matching ACE is processed and then the last ACE is examined.
- C、The matching ACE is processed and then the next ACE is examined.
- D、The matching ACE is processed and the next packet is examined
参考答案
更多 “Which of the following is true of an ACL when a packet matching an ACE is found?()A、The matching ACE is skipped to allow all other ACEs to be examined.B、The matching ACE is processed and then the last ACE is examined.C、The matching ACE is processed and then the next ACE is examined.D、The matching ACE is processed and the next packet is examined” 相关考题
考题
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
A. Traffic is permitted from the trust zone to the untrust zone.B. Intrazone traffic in the trust zone is permitted.C. All traffic through the device is denied.D. The policy is matched only when no other matching policies are found.
考题
Which two tasks are accomplished by the firewall filter shown in the exhibit?()
A. Traffic matching the my-policy term will be counted and accepted.B. Traffic matching the my-policy term will be counted and discarded.C. Traffic not matching the my-policy term will be discarded.D. Traffic not matching the my-policy term will be accepted.
考题
Assuming both paths shown in the exhibit are available, which statement is correct?()
A. Traffic matching the default route will use 10.1.1.1 as the next hop.B. Traffic matching the default route will use 10.1.1.254 as the next hop.C. Traffic matching the default route will be load-balanced per packet across both next hops.D. Traffic matching the default route will be load-balanced per flow across both next hops.
考题
Which of the following is true of an ACL when a packet matching an ACE is found?()
A. The matching ACE is skipped to allow all other ACEs to be examined.B. The matching ACE is processed and then the last ACE is examined.C. The matching ACE is processed and then the next ACE is examined.D. The matching ACE is processed and the next packet is examined
考题
Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network.Which of the following answers best describes the router‘s logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()A. When the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceB. When routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceC. When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceD. When permitted by an ACL that was referenced in the associated crypto map
考题
Refer to the exhibit. On the basis of the partial configuration, which two statements are correct? ()
A. Only routes 10.0.1.0/24 will be sent out all interfaces.B. Only routes matching 10.0.0.0/8 will be advertised out interfaces other than Ethernet 0.C. Only routes matching 10.0.0.0/8 will be advertised out Ethernet 0.D. Only routes matching 10.0.1.0/24 will be advertised out Ethernet 0.E. Only routes 10.0.1.0/24 will be allowed in the routing table.F. All rout es will be advertised out interfaces other than Ethernet 0.
考题
The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.0 0.0.0.255 any What is the effect of this access list configuration?()
A. permit all packets matching the first three octets of the source address to all destinationsB. permit all packet matching the last octet of the destination address and accept all source addressesC. permit all packet matching the host bits in the source address to all destinationsD. permit all packet from the third subnet of the network address to all destinations
考题
The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()
A.ermit all packet smatching the first three octets of the source address to all destinationsB.permit all packet matching the last octet of the destination address and accept all source addressesC.permit all packet matching the host bits in the source address to all destinationsD.permit all packet from the third subnet of the network address to all destinations
考题
The following configuration line was added to router R1Access-list 101 permit ip 10.25.30.00.0.0.255 anyWhat is the effect of this access list configuration?()
A.ermit all packets matching the first three octets of the source address to all destinationsB.permit all packet matching the last octet of the destination address and accept all source addressesC.permit all packet matching the host bits in the source address to all destinationsD.permit all packet from the third subnet of the network address to all destinations
考题
What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。
A.permit all packets matching the first three octets of the source address to all destinationsB.permit all packets matching the last octet of the destination address and accept all source addressesC.permit all packets from the third subnet of the network address to all destinationsD.permit all packets matching the host bits in the source address to all destinationsE.permit all packets to destinations matching the first three octets in the destination address
考题
The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()A、ermit all packet smatching the first three octets of the source address to all destinationsB、permit all packet matching the last octet of the destination address and accept all source addressesC、permit all packet matching the host bits in the source address to all destinationsD、permit all packet from the third subnet of the network address to all destinations
考题
The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()A、ermit all packets matching the first three octets of the source address to all destinationsB、permit all packet matching the last octet of the destination address and accept all source addressesC、permit all packet matching the host bits in the source address to all destinationsD、permit all packet from the third subnet of the network address to all destinations
考题
Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network. Which of the following answers best describes the router's logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()A、When the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceB、When routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceC、When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceD、When permitted by an ACL that was referenced in the associated crypto map
考题
Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A、 Routed mode requires the ACE run OSPF or EIGRPB、 Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC、 Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD、 One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE
考题
ACE是Area Control Error即区域控制误差的简称,其计算公式为()。其中△PT为联络线功率交换误差,△f为频率偏差,β为偏差系数。A、ACE=β△PT+△fB、ACE=β(△PT+△F.C、ACE=β△PT/△fD、ACE=△PT+β△f
考题
Which two statements about an interface configured with the asr-group command are correct?()A、The FWSM supports up to 16 asymmetric routing groups.B、If a matching packet is not found, the packet is dropped.C、Asymetric routing of return traffic is enabled.D、If a matching packet is found, the Layer 3 header is rewritten.E、If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.
考题
What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。A、permit all packets matching the first three octets of the source address to all destinationsB、permit all packets matching the last octet of the destination address and accept all source addressesC、permit all packets from the third subnet of the network address to all destinationsD、permit all packets matching the host bits in the source address to all destinationsE、permit all packets to destinations matching the first three octets in the destination address
考题
What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()A、The best match of the ACL entries will be used for granularity of control.B、They use source IP information for matching operations.C、They use source and destination IP information for matching operations.D、They use source IP information along with protocol-type information for finer granularity of control.
考题
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.
考题
单选题What is the effect of the following access list condition? access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。A
permit all packets matching the first three octets of the source address to all destinationsB
permit all packets matching the last octet of the destination address and accept all source addressesC
permit all packets from the third subnet of the network address to all destinationsD
permit all packets matching the host bits in the source address to all destinationsE
permit all packets to destinations matching the first three octets in the destination address
考题
单选题Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A
Routed mode requires the ACE run OSPF or EIGRPB
Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC
Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD
One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE
考题
单选题Which of the following is true of an ACL when a packet matching an ACE is found?()A
The matching ACE is skipped to allow all other ACEs to be examined.B
The matching ACE is processed and then the last ACE is examined.C
The matching ACE is processed and then the next ACE is examined.D
The matching ACE is processed and the next packet is examined
考题
单选题Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network. Which of the following answers best describes the router's logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()A
When the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceB
When routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceC
When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceD
When permitted by an ACL that was referenced in the associated crypto map
考题
多选题Which two statements about an interface configured with the asr-group command are correct?()AThe FWSM supports up to 16 asymmetric routing groups.BIf a matching packet is not found, the packet is dropped.CAsymetric routing of return traffic is enabled.DIf a matching packet is found, the Layer 3 header is rewritten.EIf a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.
考题
单选题Assuming both paths shown in the exhibit are available, which statement is correct?()A
Traffic matching the default route will use 10.1.1.1 as the next hop.B
Traffic matching the default route will use 10.1.1.254 as the next hop.C
Traffic matching the default route will be load-balanced per packet across both next hops.D
Traffic matching the default route will be load-balanced per flow across both next hops.
热门标签
最新试卷