网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()

  • A、FTP
  • B、Telnet
  • C、SMTP
  • D、DNS
  • E、HTTP
  • F、POP3

参考答案

更多 “An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()A、FTPB、TelnetC、SMTPD、DNSE、HTTPF、POP3” 相关考题
考题 AWindowsAzureapplicationisactivatedforWindowsAzureConnectAcorporatepolicyblocksInternettrafficforlocalservers.YouneedtorecommendthefirewallrulethatwillallowWindowsAzureConnecttrafficforlocalservers.Whatshouldyourecommend?()A.AllowTCPport443inbound.B.AllowTCPport3389outbound.C.AllowTCPport3389inbound.D.AllowTCPport443outbound.

考题 What is a Host Enforcer policy?() A. A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.B. A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.C. A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.D. A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.

考题 Your ERX Edge Router is using an inbound route-map for an EBGP peer to only accept routes in the range of 192.168.32.0 through 192.168.95.255. The route-map references an access list named test .What accurately accomplishes the goal of the route-map?()A. access-list test 192.168.32.0 0.0.63.255B. access-list test permit 192.168.32.0 0.0.64.255C. access-list test permit 192.168.32.0 0.0.63.255D. access-list test permit 192.168.32.0 255.255.63.0

考题 In a base e-Commerce module design, which routing statement is correct?() A. Routing is mostly static.B. Hardcoded IP addresses are used to support failover.C. Inbound servers use the CSM or ACE as the default gateway.D. VLANs between the access layer switches are used for FHRP protocols.

考题 An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。A、FTPB、TelnetC、SMTPD、DNSE、HTTPF、POP3

考题 What is a Host Enforcer policy?()A、A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.B、A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.C、A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.D、A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.

考题 You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()A、as an outbound filter on interface fxp0B、as an outbound filter on interface lo0C、as an inbound filter on interface fxp0D、as an inbound filter on interface lo0

考题 Your ERX Edge Router is using an inbound route-map for an EBGP peer to only accept routes in the range of 192.168.32.0 through 192.168.95.255. The route-map references an access list named test . What accurately accomplishes the goal of the route-map?()A、access-list test 192.168.32.0 0.0.63.255B、access-list test permit 192.168.32.0 0.0.64.255C、access-list test permit 192.168.32.0 0.0.63.255D、access-list test permit 192.168.32.0 255.255.63.0

考题 On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic will be allowed through this interface?()A、SMTPB、DNSC、FTPD、TelnetE、HTTPF、POP3

考题 Which three statements accurately describe IOS Firewall configurations?()A、The IP inspection rule can be applied in the inbound direction on the secured interfaceB、The IP inspection rule can be applied in the outbound direction on the unsecured interfaceC、The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.D、For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

考题 When are packets processed in an inbound access list?()A、Before they are routed to an outbound interface.B、After they are routed for outbound traffic.C、After they are routed to an outbound interface while queuing.D、Before and after they are routed to an outbound interface.E、Depends on the configuration of the interfaceF、None of the above

考题 In a base e-Commerce module design, which routing statement is correct?()A、Routing is mostly static.B、Hardcoded IP addresses are used to support failover.C、Inbound servers use the CSM or ACE as the default gateway.D、VLANs between the access layer switches are used for FHRP protocols.

考题 You are the Cisco Network Designer in Cisco.com. You are designing an e-Commerce module, which routing statement is correct?()A、Routing is mostly static.B、Hardcoded IP addresses are used to support failover.C、Inbound servers use the CSM or ACE as the default gateway.D、VLANs between the access layer switches are used for FHRP protocols.

考题 An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL? ()A、FTPB、TelnetC、SMTPD、DNSE、HTTPF、POP3

考题 使配置的访问列表应用到接口上的命令是什么?()A、access-groupB、access-listC、aclD、firewall packet-filter xxxx inbound/outbound

考题 You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

考题 单选题A company has a BGP network and a BGP route of 196.27.125.0/24 that should be propagated toall of the devices. The route is not now in any of the routing tables. The administrator determinesthat an access list is the cause of the problem. The administrator changes the access list to allowthis route, but the route still does not appear in any of the routing tables. What should be done topropagate this route?()A Clear the BGP sessionB Change both the inbound and outbound policy related to this routeC Use the service-policy command to adjust the QOS policy to allow the route to propagateD Use the release BGP routing command

考题 单选题What is a Host Enforcer policy?()A A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.B A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.C A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.D A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.

考题 多选题An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()AFTPBTelnetCSMTPDDNSEHTTPFPOP3

考题 多选题An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。AFTPBTelnetCSMTPDDNSEHTTPFPOP3

考题 多选题An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL? ()AFTPBTelnetCSMTPDDNSEHTTPFPOP3

考题 单选题You need to control SSH. HTTP, and Telnet access to an MX240 router through any interface. You have decided to use a firewall filter. How should you apply the firewall filter?()A as an outbound filter on interface fxp0B as an outbound filter on interface lo0C as an inbound filter on interface fxp0D as an inbound filter on interface lo0

考题 单选题When are packets processed in an inbound access list?()A Before they are routed to an outbound interface.B After they are routed for outbound traffic.C After they are routed to an outbound interface while queuing.D Before and after they are routed to an outbound interface.E Depends on the configuration of the interfaceF None of the above

考题 多选题Which two statements describe the purpose of a security policy?()AIt enables traffic counting and logging.BIt enforces a set of rules for transit traffic.CIt controls host inbound services on a zone.DIt controls administrator rights to access the device.

考题 单选题You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()A as an outbound filter on interface fxp0B as an outbound filter on interface lo0C as an inbound filter on interface fxp0D as an inbound filter on interface lo0

考题 单选题In a base e-Commerce module design, which routing statement is correct?()A  Routing is mostly static.B  Hardcoded IP addresses are used to support failover.C  Inbound servers use the CSM or ACE as the default gateway.D  VLANs between the access layer switches are used for FHRP protocols.

考题 单选题You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A  Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B  Allow all inbound VPN traffic to pass through the perimeter firewall only.C  Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D  Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.