网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following commands would successfully implement an access list on a routers virtual terminal line?()
A
RouterTK(config-line)# access-class 10 in
B
RouterTK(config-if)# ip access-class 23 out
C
RouterTK(config-line)# access-list 150 in
D
RouterTK(config-if)# ip access-list 128 out
E
RouterTK(config-line)# access-group 15 out
F
RouterTK(config-if)# ip access-group 110 in
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following commands would successfully implement an access list on a routers virtual terminal line?()A RouterTK(config-line)# access-class 10 inB RouterTK(config-if)# ip access-class 23 outC RouterTK(config-line)# access-list 150 inD RouterTK(config-if)# ip access-list 128 outE RouterTK(config-line)# access-group 15 outF RouterTK(config-if)# ip access-group 110 in” 相关考题
考题
Which of the following commands would successfully implement an access list on a routers virtual terminal line?()
A. RouterTK(config-line)# access-class 10 inB. RouterTK(config-if)# ip access-class 23 outC. RouterTK(config-line)# access-list 150 inD. RouterTK(config-if)# ip access-list 128 outE. RouterTK(config-line)# access-group 15 outF. RouterTK(config-if)# ip access-group 110 in
考题
Which of the following commands would successfully implement an access list on a routers virtual terminal line?()A、RouterTK(config-line)# access-class 10 inB、RouterTK(config-if)# ip access-class 23 outC、RouterTK(config-line)# access-list 150 inD、RouterTK(config-if)# ip access-list 128 outE、RouterTK(config-line)# access-group 15 outF、RouterTK(config-if)# ip access-group 110 in
考题
Which of these phase comprises post-project support activities: activities that happen after a project is successfully implemented and handed off? Select exactly 1 answer(s) from the following:()。A、planB、prepareC、operateD、implement
考题
Which of the following commands would a technician MOST likely use to map a printer from aremote computer?()A、NET USEB、IPCONFIGC、NSLOOKUPD、TRACERT
考题
Which of the following commands would be used to verify the integrity of critical system files?()A、verifyB、nslookupC、sfcD、chkdsk
考题
Which of the following commands would be used to display the IP address on a UNIX/Linux computer?()A、netstatB、ipconfigC、ifconfigD、dig
考题
Which of the following would a company implement to help reduce the cost of electricity?()A、Shutdown/power policiesB、Redundant power suppliesC、Use optical miceD、Social engineering policy
考题
Which of the following is MOST likely the reason a technician would implement software RAID for a SOHO environment?()A、CPU efficiencyB、High availabilityC、High redundancyD、Cost effective
考题
Which of the following commands would be used to verify and troubleshoot DNS settings of aparticular host on a Windows computer?()A、TRACERTB、NSLOOKUPC、CHKDSKD、XCOPY
考题
Which of the following commands would be used to display hidden files?()A、dir /?B、dir /dC、dir /aD、dir /s
考题
Following a system boot,the display indicates that previously detected hardware is missing. Which of the following commands would identify the missing hardware?()A、diagB、lscfgC、cfgmgrD、lsslot
考题
A system administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this?()A、usrckB、sysckC、lssecD、lsuser
考题
A System p administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this()A、sysckB、usrckC、lssecD、lsuser
热门标签
最新试卷