网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What does the mac packet-classify command do when applied to an interface configuration?()
A

 It enables MAC ACLs to be applied to only IP packets that enter the interface.

B

 It enables MAC ACLs to be applied to only non-IP packets that enter the interface.

C

 It enables MAC ACLs to be applied to all packets that enter the interface.

D

 It enables MAC ACLs to be used for QoS settings.


参考答案

参考解析
解析: 暂无解析
更多 “单选题What does the mac packet-classify command do when applied to an interface configuration?()A  It enables MAC ACLs to be applied to only IP packets that enter the interface.B  It enables MAC ACLs to be applied to only non-IP packets that enter the interface.C  It enables MAC ACLs to be applied to all packets that enter the interface.D  It enables MAC ACLs to be used for QoS settings.” 相关考题
考题 Refer to the exhibit. Which two statements are true?() A. DHCPDISCOVER packets will reach the DHCP server.B. The router will not forward DHCPDIS COVER packets because it has not been configured to do so.C. This configuration is applied to interface Fa0/1.D. DHCPDISCOVER packets will not reach the DHCP server because DHCPDISCOVER packets are broadcasts.E. DHCPDISCOVER packets will not reach the DHCP server because ports 67 and 68 have not been explicitly allowed by the ip forward - protocol command.F. This configuration is applied to interface Fa0/0.

考题 A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

考题 What does qos pre-classify provides inregardto implementing QoS over GRE/IPSec VPN tunnels?()A、 enables IOS to copy the ToS field from the inner (original) IPheader to theouter tunnel IP headerB、 enables IOS to make a copy of the inner (original) IP header and to run a QoS classification before encryption, based on fields in the inner IP header.C、 enables IOS to classify packets based on the ToS field in the inner (original) IP headerD、 enables IOS to classify packets based on the ToS field in the outer tunnel IP headerE、 enables the IOS classification engine to only see a single encrypted and tunneledflow to reduce classification complexity

考题 A GRE tunnel is configured between a local and a remote site. Where should the service policy be applied to classify packets based on the pretunnel header? ()A、in global configuration mode, apply the service policy and use the qos pre-classifyB、in global configuration mode, apply the service policy but do not use the qos pre-classify commandC、apply the service policy on the physical interface but do not use the qos pre-classifyD、apply the service policy on the tunnel interface but do not use the qos pre-classify command E、apply the service policy on the tunnel interface and use the qos pre-classify command

考题 Which two design concerns must be addressed when designing a multicast implementation?()A、only the low-order 23 bits of the MAC address are used to map IP addressesB、only the low-order 24 bits of the MAC address are used to map IP addressesC、only the high-order 23 bits of the MAC address are used to map IP addressesD、only the low-order 23 bits of the IP address are used to map MAC addressesE、the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addressesF、the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses

考题 What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()A、Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.B、Packets are distributed across the ports in the channel based on both the source and destination IP addresses.C、Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.D、Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.

考题 Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()A、It is applied only on the input interface of a router.B、It is applied only on the output interface of a router.C、It can be configured either on the input or output interface of a router.D、It cannot be configured on a router interface.E、It is configured under any routing protocol process.

考题 What does the mac packet-classify command do when applied to an interface configuration?()A、 It enables MAC ACLs to be applied to only IP packets that enter the interface.B、 It enables MAC ACLs to be applied to only non-IP packets that enter the interface.C、 It enables MAC ACLs to be applied to all packets that enter the interface.D、 It enables MAC ACLs to be used for QoS settings.

考题 Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()A、The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.B、The ACL is applied to the Telnet port with the ip access-group command.C、The ACL must be applied to each vty line individually.D、The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.

考题 Which three statements about IOS Firewall configurations are true?()A、The IP inspection rule can be applied in the inbound direction on the secured interface.B、The IP inspection rule can be applied in the outbound direction on the unsecured interface.C、The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.D、The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.E、For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.F、For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.

考题 On a Company switch named R1 you configure the following:  iparp inspection vlan 10-12, 15   What is the purpose of this global configuration command made on R1?()A、 Discards ARP packets with invalid IP-to-MAC address bindings on trusted portsB、 Validates outgoing ARP requests for interfaces configured on VLAN 10, 11, 12, or 15C、 Intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindingsD、 Intercepts all ARP requests and responses on trusted portsE、 None of the other alternatives apply

考题 When you enable port security on an interface that is also configured with a voice VLAN,  what is the maximum number of secure MAC addresses that should be set on the port?()A、No more than one secure MAC address should be set.B、The default will be set.C、The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D、No value is needed if the switchport priority extend command is configured. E、No more than two secure MAC addresses should be set.

考题 A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

考题 What is true about access control on bridged and routed VLAN traffic? ()A、 Router ACLs can be applied to the input and output directions of a VLAN interface.B、 Bridged ACLs can be applied to the input and output directions of a VLAN interface.C、 Only router ACLs can be applied to a VLAN interface.D、 VLAN maps and router ACLs can be used in combination.E、 VLAN maps can be applied to a VLAN interface

考题 Which statement about PPPoA configuration is correct?()A、The dsl operating-mode auto command is required if the default mode has been changedB、The ip mtu 1496 command must be applied on the dialer interfaceC、The encapsulation ppp command is requiredD、The ip mtu 1492 command must be applied on the dialer interface

考题 What is true about access control on bridged and routed VLAN traffic?()A、Router ACLs can be applied to the input and output directions of a VLAN interfaceB、Bridged ACLs can be applied to the input and output directions of a VLAN interfaceC、Only router ACLs can be applied to a VLAN interfaceD、VLAN maps and router ACLs can be used in combinationE、VLAN maps can be applied to a VLAN interfac

考题 What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()A、IP addressB、MAC addressC、protocolD、portE、session ID

考题 Given the following MPLS L2 configuration command: mpls-relay 10.1.1.1 4 Which two statements true? ()(Choose two.)A、This command is applied to the core router facing interface.B、This command is applied to the customer facing interface.C、The 4 is locally significant and identifies the layer 2 circuit.D、The 4 must match exactly on the peer router configuration on the remote end.

考题 单选题A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

考题 单选题A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices.What would be the most efficient way to configure MAC-level security on all these ports? ()A Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

考题 多选题What is true about access control on bridged and routed VLAN traffic?()ARouter ACLs can be applied to the input and output directions of a VLAN interfaceBBridged ACLs can be applied to the input and output directions of a VLAN interfaceCOnly router ACLs can be applied to a VLAN interfaceDVLAN maps and router ACLs can be used in combinationEVLAN maps can be applied to a VLAN interfac

考题 单选题Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()A It is applied only on the input interface of a router.B It is applied only on the output interface of a router.C It can be configured either on the input or output interface of a router.D It cannot be configured on a router interface.E It is configured under any routing protocol process.

考题 单选题What does qos pre-classify provides inregardto implementing QoS over GRE/IPSec VPN tunnels?()A  enables IOS to copy the ToS field from the inner (original) IPheader to theouter tunnel IP headerB  enables IOS to make a copy of the inner (original) IP header and to run a QoS classification before encryption, based on fields in the inner IP header.C  enables IOS to classify packets based on the ToS field in the inner (original) IP headerD  enables IOS to classify packets based on the ToS field in the outer tunnel IP headerE  enables the IOS classification engine to only see a single encrypted and tunneledflow to reduce classification complexity

考题 单选题What does the mac packet-classify command do when applied to an interface configuration?()A  It enables MAC ACLs to be applied to only IP packets that enter the interface.B  It enables MAC ACLs to be applied to only non-IP packets that enter the interface.C  It enables MAC ACLs to be applied to all packets that enter the interface.D  It enables MAC ACLs to be used for QoS settings.

考题 单选题When you enable port security on an interface that is also configured with a voice VLAN,  what is the maximum number of secure MAC addresses that should be set on the port?()A No more than one secure MAC address should be set.B The default will be set.C The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D No value is needed if the switchport priority extend command is configured. E No more than two secure MAC addresses should be set.

考题 单选题A GRE tunnel is configured between a local and a remote site. Where should the service policy be applied to classify packets based on the pretunnel header? ()A in global configuration mode, apply the service policy and use the qos pre-classifyB in global configuration mode, apply the service policy but do not use the qos pre-classify commandC apply the service policy on the physical interface but do not use the qos pre-classifyD apply the service policy on the tunnel interface but do not use the qos pre-classify command E apply the service policy on the tunnel interface and use the qos pre-classify command

考题 多选题What is true about access control on bridged and routed VLAN traffic? ()ARouter ACLs can be applied to the input and output directions of a VLAN interface.BBridged ACLs can be applied to the input and output directions of a VLAN interface.COnly router ACLs can be applied to a VLAN interface.DVLAN maps and router ACLs can be used in combination.EVLAN maps can be applied to a VLAN interface

考题 单选题Which statement about PPPoA configuration is correct?()A The dsl operating-mode auto command is required if the default mode has been changedB The ip mtu 1496 command must be applied on the dialer interfaceC The encapsulation ppp command is requiredD The ip mtu 1492 command must be applied on the dialer interface