网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
What are some general guidelines regarding the placement of access control lists?()

A. You should place standard ACLS as close as possible to the source of traffic to be denied.

B. You should place extended ACLS as close as possible to the source of traffic to be denied.

C. You should place standard ACLS as close as possible to the destination of traffic to be denied.

D. You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.


参考答案

更多 “ What are some general guidelines regarding the placement of access control lists?() A. You should place standard ACLS as close as possible to the source of traffic to be denied.B. You should place extended ACLS as close as possible to the source of traffic to be denied.C. You should place standard ACLS as close as possible to the destination of traffic to be denied.D. You should place extended ACLS should be places as close as possible to the destination of traffic to be denied. ” 相关考题
考题 Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.) A. protocol listB. MIMEC. block listD. extension

考题 Which command is used to display the placement and direction of an IP access control list on a router?() A. show access-listB. show ip routeC. show ip interfaceD. show interfaceE. show interface listF. show ip interface brief

考题 You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A. show access-listB. show ip access-listC. show ip interfaceD. show interfaceE. show interface list

考题 For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。 A.IPB.ICMPC.TCPD.UDP

考题 You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A、show access-listB、show ip access-listC、show ip interfaceD、show interfaceE、show interface list

考题 What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions

考题 Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()A、Application of up to three access lists per protocol to a single interface.B、No more than two access lists per interface.C、One access list may be configured per direction for each Layer 3 protocol configured on an interface.D、The maximum number allowed varies due to RAM availability in the router.E、An infinite number of access lists that can be applied to an interface, from most specific to most general.F、Cisco IOS allows only one access list to an interface.

考题 What are two step needed to define a QoS policy for a traffic class?()A、determine a minimum bandwidth guaranteeB、determine interfaces to which to apply policyC、assign priorities to the classD、configure access control lists

考题 Which of these is true regarding the configuration and application of port access control lists? ()A、PACLs can be applied in the inbound or outbound direction of a Layer 2 physical interface. B、At Layer 2, a MAC address PACL will take precedence over any existing Layer 3 PACL.C、When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port.D、PACLs are not supported on EtherChannel interfaces.

考题 Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()A、show interface listB、show ip routeC、show ip interfaceD、show ip interface briefE、show interface

考题 What are two steps needed to define a QoS policy for a traffic class?()A、 Determine a minimum bandwidth guarantee.B、 Determine interfaces to which to apply policy.C、 Assign priorities to the class.D、 Configure access control lists.

考题 Which command is used to display the placement and direction of an IP access control list on a router?()A、show access-listB、show ip routeC、show ip interfaceD、show interfaceE、show interface listF、show ip interface brief

考题 What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router  B、to control broadcast traffic through a router  C、to filter traffic as it passes through a router  D、to filter traffic that originates from the router  E、to replace passwords as a line of defense against security incursions 

考题 What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()A、The best match of the ACL entries will be used for granularity of control.B、They use source IP information for matching operations.C、They use source and destination IP information for matching operations.D、They use source IP information along with protocol-type information for finer granularity of control.

考题 In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()A、to specify the destination addresses to which access is permittedB、to specify the source address permitted to access the resourceC、to specify the services to which access is permittedD、to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

考题 You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1

考题 You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()A、Use Windows directory service mapper and enable Microsoft .NET Passport authenticationB、Create authorization rules and scopes by using Authorization ManagerC、Use one-to-many client certificate mappingD、Define permissions by using access control lists (ACLs)

考题 单选题Which command is used to display the placement and direction of an IP access control list on a router?()A show access-listB show ip routeC show ip interfaceD show interfaceE show interface listF show ip interface brief

考题 多选题Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)Aprotocol listBMIMECblock listDextension

考题 单选题Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()A show interface listB show ip routeC show ip interfaceD show ip interface briefE show interface

考题 单选题Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()A Application of up to three access lists per protocol to a single interface.B No more than two access lists per interface.C One access list may be configured per direction for each Layer 3 protocol configured on an interface.D The maximum number allowed varies due to RAM availability in the router.E An infinite number of access lists that can be applied to an interface, from most specific to most general.F Cisco IOS allows only one access list to an interface.

考题 单选题What does a Cisco Unified Wireless IP Phone 7921G deployment require()?A more access points than a data networkB fewer access points than a data networkC less SNR than a data networkD specific relative access point placement

考题 多选题What are some general guidelines regarding the placement of access control lists?()AYou should place standard ACLS as close as possible to the source of traffic to be denied.BYou should place extended ACLS as close as possible to the source of traffic to be denied.CYou should place standard ACLS as close as possible to the destination of traffic to be denied.DYou should place extended ACLS should be places as close as possible to the destination of traffic to be denied.

考题 单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()A IPB ICMPC TCPD UDP

考题 单选题You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A show access-listB show ip access-listC show ip interfaceD show interfaceE show interface list

考题 单选题What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()A The best match of the ACL entries will be used for granularity of control.B They use source IP information for matching operations.C They use source and destination IP information for matching operations.D They use source IP information along with protocol-type information for finer granularity of control.

考题 单选题An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()A Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.B Configure pNAT to ensure Voice over IP packets are properly translated.C Configure IOS firewall to permit RTP port numbers through the firewall via VPN. D Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.

考题 单选题Some cable services offer 1.5 megabyte or higher access for as ______ as $40 a month, but there are some restrictions regarding service.A littleB shortC scarceD rare