网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。
A.protocol
B.VLAN number
C.TCP or UDP port numbers
D.source switch port number
E.source IP address and destination IP address
F.source MAC address and destination MAC address
参考答案
更多 “ What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。 A.protocolB.VLAN numberC.TCP or UDP port numbersD.source switch port numberE.source IP address and destination IP addressF.source MAC address and destination MAC address ” 相关考题
考题
Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)
A. routing-instanceB. zoneC. interfaceD. policyE. rule-set
考题
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
A. access profileB. client groupC. clientD. default profileE. external
考题
What are three characteristics of a service tunnel? ()(Choose three.)
A. It is bidirectional.B. It carries optimized traffic.C. It can carry traffic using UDP.D. It is formed only within a community
考题
Which three statistics does the Executive report summarize?() (Choose three.)
A. latency and lossB. compression resultsC. traffic (by application)D. CRC and alignment errorsE. user access (by username)
考题
What are the three main parts of a syslog message? ()(Choose three.)A、severity levelB、facilityC、log message nameD、time stampE、error codesF、access privilege
考题
An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。A、FTPB、TelnetC、SMTPD、DNSE、HTTPF、POP3
考题
What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions
考题
What are three pieces of information that the Cisco IOS show inventory command displays on a Cisco ISR Router? ()(Choose three.)A、Installed Hardware serial numbersB、The status of installed hardwareC、Installed hardwareD、Unique Device IdentifierE、system internal temperatureF、main power supply condition
考题
Which three statistics does the Executive report summarize?() (Choose three.)A、latency and lossB、compression resultsC、traffic (by application)D、CRC and alignment errorsE、user access (by username)
考题
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A、protocolB、VLAN numberC、TCP or UDP port numbersD、source switch port numberE、source IP address and destination IP addressF、source MAC address and destination MAC address
考题
What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router B、to control broadcast traffic through a router C、to filter traffic as it passes through a router D、to filter traffic that originates from the router E、to replace passwords as a line of defense against security incursions
考题
An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()A、FTPB、TelnetC、SMTPD、DNSE、HTTPF、POP3
考题
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects
考题
Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)A、routing-instanceB、zoneC、interfaceD、policyE、rule-set
考题
What are three characteristics of a service tunnel? ()(Choose three.)A、It is bidirectional.B、It carries optimized traffic.C、It can carry traffic using UDP.D、It is formed only within a community
考题
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)A、access profileB、client groupC、clientD、default profileE、external
考题
What are three WAN reports that can be generated with the WX device?() (Choose three.)A、throughputB、performanceC、pass-throughD、application summaryE、packet size distribution
考题
多选题What are three pieces of information that the Cisco IOS show inventory command displays on a Cisco ISR Router? ()(Choose three.)AInstalled Hardware serial numbersBThe status of installed hardwareCInstalled hardwareDUnique Device IdentifierEsystem internal temperatureFmain power supply condition
考题
多选题What are three characteristics of a service tunnel? ()(Choose three.)AIt is bidirectional.BIt carries optimized traffic.CIt can carry traffic using UDP.DIt is formed only within a community
考题
多选题What are three WAN reports that can be generated with the WX device?() (Choose three.)AthroughputBperformanceCpass-throughDapplication summaryEpacket size distribution
考题
多选题What are three ways an IP interface can be assigned to a virtual router in a PPP over ATM environment? ()(Choose three.)AprofileBpolicy listCdomain mapDRADIUS VSAEclassifier ACL
考题
多选题An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()AFTPBTelnetCSMTPDDNSEHTTPFPOP3
考题
多选题Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)Arouting-instanceBzoneCinterfaceDpolicyErule-set
考题
多选题An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。AFTPBTelnetCSMTPDDNSEHTTPFPOP3
考题
多选题Which three of these items are found within the router advertisement message of IPv6 stateless autoconfiguration?() (Choose three.)Aflags indicating the kind of autoconfiguration that can be done by hostsBdefault router informationC/64 prefix that can be used on the link and the lifetime of the prefixDIPv6 DHCP server address information
考题
多选题What are three configuration objects used to build Junos IDP rules? ()(Choose three.)Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects
考题
多选题What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。AprotocolBVLAN numberCTCP or UDP port numbersDsource switch port numberEsource IP address and destination IP addressFsource MAC address and destination MAC address
热门标签
最新试卷