网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()
A

/var/rmc/ctrmc.acls

B

/etc/ctrmc/rsct.acls

C

/etc/security/rsct.acls

D

/usr/sbin/rsct/cfg/ctrmc.acls


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()A /var/rmc/ctrmc.aclsB /etc/ctrmc/rsct.aclsC /etc/security/rsct.aclsD /usr/sbin/rsct/cfg/ctrmc.acls” 相关考题
考题 Which of the following is the BEST way to allow web software through the server firewall?() A. Implement an application exception.B. Implement an access control list (ACL).C. Open the corporate firewall to allow port 80.D. Implement port blocking on port 80.

考题 Which of the following objects contains control structures that are considered the bound form of SQL statements?() A.UDTB.TriggerC.PackageD.Access plan

考题 Which switching engine enables the access control list lookup to be committed to hardware? () A.IETFB.PFCC.ASICD.TCAM

考题 Refer to the exhibit. A partial routing configuration is shown. Complete the configuration so that only the default - network is redistributed from EIGRP 190 into EIGRP 212. Which ACL statement completes the configuration correctly? ()A. access - list 100 permit ip 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0 .0B. access - list 100 permit ip host 0.0.0.0 anyC. access - list 100 permit ip any host 0.0.0.0D. A default -network cannot be redistributed between routing processes.

考题 You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A. show access-listB. show ip access-listC. show ip interfaceD. show interfaceE. show interface list

考题 Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?() A. show interface listB. show ip routeC. show ip interfaceD. show ip interface briefE. show interface

考题 You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?() A. permit access-list 101 outB. ip access-group 101 outC. apply access-list 101 outD. access-class 101 outE. ip access-list e0 out

考题 Which of the following access list statements would deny traffic from a specifichost?() A. Router(config)# access-list 1 deny 172.31.212.74 anyB. Router(config)# access-list 1 deny 10.6.111.48 hostC. Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0D. Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0E. Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255

考题 Which one of the access control list statements below will deny all telnet connections to subnet 10.10.1.0/24?() A. access-list 15 deny telnet any 10.10.1.0 0.0.0.255 eq 23B. access-list 115 deny udp any 10.10.1.0 eq telnetC. access-list 15 deny tcp 10.10.1.0 255.255.255.0 eq telnetD. access-list 115 deny tcp any 10.10.1.0 0.0.0.255 eq 23E. access-list 15 deny udp any 10.10.1.0 255.255.255.0 eq 23

考题 As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()A.access-list 101 inB.access-list 101 outC.ip access-group 101 inD.ip access-group 101 out

考题 Which one of the access control list statements below will deny all telnet connections to subnet 10.10.1.0/24?()A、access-list 15 deny telnet any 10.10.1.0 0.0.0.255 eq 23B、access-list 115 deny udp any 10.10.1.0 eq telnetC、access-list 15 deny tcp 10.10.1.0 255.255.255.0 eq telnetD、access-list 115 deny tcp any 10.10.1.0 0.0.0.255 eq 23E、access-list 15 deny udp any 10.10.1.0 255.255.255.0 eq 23

考题 Which of the following objects contains control structures that are considered the bound form of SQL statements?()A、UDTB、TriggerC、PackageD、Access plan

考题 You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A、permit access-list 101 outB、ip access-group 101 outC、apply access-list 101 outD、access-class 101 outE、ip access-list e0 out

考题 You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A、show access-listB、show ip access-listC、show ip interfaceD、show interfaceE、show interface list

考题 A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()A、are optionalB、are used to protect data beansC、provide coarse-grained access controlD、never specify a relationship

考题 Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()A、show interface listB、show ip routeC、show ip interfaceD、show ip interface briefE、show interface

考题 With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()A、IETFB、PFCC、TCAMD、ASIC

考题 Which switching engine enables the access control list lookup to be committed to hardware? ()A、IETFB、PFCC、ASICD、TCAM

考题 As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()A、access-list 101 inB、access-list 101 outC、ip access-group 101 inD、ip access-group 101 out

考题 Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.

考题 Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()A、/var/rmc/ctrmc.aclsB、/etc/ctrmc/rsct.aclsC、/etc/security/rsct.aclsD、/usr/sbin/rsct/cfg/ctrmc.acls

考题 单选题Which command is used to display the placement and direction of an IP access control list on a router?()A show access-listB show ip routeC show ip interfaceD show interfaceE show interface listF show ip interface brief

考题 单选题Which of the following access list statements would deny traffic from a specifichost?()A Router(config)# access-list 1 deny 172.31.212.74 anyB Router(config)# access-list 1 deny 10.6.111.48 hostC Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0D Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0E Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255

考题 单选题Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()A show interface listB show ip routeC show ip interfaceD show ip interface briefE show interface

考题 多选题A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-grained access controlDnever specify a relationship

考题 单选题You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A show access-listB show ip access-listC show ip interfaceD show interfaceE show interface list

考题 单选题You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A permit access-list 101 outB ip access-group 101 outC apply access-list 101 outD access-class 101 outE ip access-list e0 out