网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which of the following answer choices are correct characteristics of named access list?()
A

You can delete individual statements in a named access list

B

Named access lists require a numbered range from 1000 to 1099.

C

Named access lists must be specified as standard or extended.

D

You can use the ip access-list command to create named access lists.

E

You cannot delete individual statements in a named access list.

F

You can use the ip name-group command to apply named access lists.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which of the following answer choices are correct characteristics of named access list?()AYou can delete individual statements in a named access listBNamed access lists require a numbered range from 1000 to 1099.CNamed access lists must be specified as standard or extended.DYou can use the ip access-list command to create named access lists.EYou cannot delete individual statements in a named access list.FYou can use the ip name-group command to apply named access lists.” 相关考题
考题 Which of the following are characteristics of named access lists?() A. Individual statements in a named access list may be deleted.B. They require a numbered range from 1000 to 1099.C. When created, they must be specified as standard or extended.D. They are created with the ip access-list command.E. The entire access list must be deleted before editing.F. They are applied with the ip name-group command.

考题 Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?() A. Application of up to three access lists per protocol to a single interface.B. No more than two access lists per interface.C. One access list may be configured per direction for each Layer 3 protocol configured on an interface.D. The maximum number allowed varies due to RAM availability in the router.E. An infinite number of access lists that can be applied to an interface, from most specific to most general.F. Cisco IOS allows only one access list to an interface.

考题 You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command ip access-group 101 in to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()A. Telnet sessions from host A to host 5.1.1.10B. Telnet sessions from host A to host 5.1.3.10C. Telnet sessions from host B to host 5.1.2.10D. Telnet sessions from host B to host 5.1.3.8E. Telnet sessions from host C to host 5.1.3.10F. Telnet sessions from host F to host 5.1.1.10

考题 Which of the following access list statements would deny traffic from a specifichost?() A. Router(config)# access-list 1 deny 172.31.212.74 anyB. Router(config)# access-list 1 deny 10.6.111.48 hostC. Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0D. Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0E. Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255

考题 Which of the following answer choices are correct characteristics of named access list?() A. You can delete individual statements in a named access listB. Named access lists require a numbered range from 1000 to 1099.C. Named access lists must be specified as standard or extended.D. You can use the ip access-list command to create named access lists.E. You cannot delete individual statements in a named access list.F. You can use the ip name-group command to apply named access lists.

考题 Which command shows if an access list is assigned to an interface?() A. show ip interface [interface] access-listsB. show ip access-lists interface [interface]C. show ip interface [interface]D. show ip access-lists [interface]

考题 Which two statements about static NAT translations are true?() A. They are always present in the NAT table.B. They allow connection to be initiated from the outside.C. They can be configured with access lists, to allow two or more connections to be initiated from the outside.D. They require no inside or outside interface markings because addresses are statically defined.

考题 Which statement about access lists that are applied to an interface is true?() A.you can apply multiple access lists with the same protocol or in different…B.you can config one access list,per direction,per layer 3 protocolC.you can placeasmanyaccess lists as you want on any interfaceD.you can apply ony one access list on any interface

考题 Which of the following are characteristics of named access lists?()A、Individual statements in a named access list may be deleted.B、They require a numbered range from 1000 to 1099.C、When created, they must be specified as standard or extended.D、They are created with the ip access-list command.E、The entire access list must be deleted before editing.F、They are applied with the ip name-group command.

考题 Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL(Racl) is correct?()A、CoPP protects against IP spoofing;Racl protects against DoS attacks.B、CoPP can not use named access lists;Racl can use named access listsC、CoPP applies to a dedicated control plane interface;Racl applies to all interfaces.D、CoPP needs a AAA server,Racl does not need a AAA serverE、CoPP supports rate limits;Racl does not support rate limits

考题 Which of the following access list statements would deny traffic from a specifichost?()A、Router(config)# access-list 1 deny 172.31.212.74 anyB、Router(config)# access-list 1 deny 10.6.111.48 hostC、Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0D、Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0E、Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255

考题 Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different direction.B、you can config one access list,per direction,per layer 3 protocolC、you can place as many access lists as you want on any interfaceD、you can apply only one access list on any interface

考题 Which of the following answer choices are correct characteristics of named access list?()A、You can delete individual statements in a named access listB、Named access lists require a numbered range from 1000 to 1099.C、Named access lists must be specified as standard or extended.D、You can use the ip access-list command to create named access lists.E、You cannot delete individual statements in a named access list.F、You can use the ip name-group command to apply named access lists.

考题 Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different…B、you can config one access list,per direction,per layer 3 protocolC、you can placeasmanyaccess lists as you want on any interfaceD、you can apply ony one access list on any interface

考题 Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()A、Application of up to three access lists per protocol to a single interface.B、No more than two access lists per interface.C、One access list may be configured per direction for each Layer 3 protocol configured on an interface.D、The maximum number allowed varies due to RAM availability in the router.E、An infinite number of access lists that can be applied to an interface, from most specific to most general.F、Cisco IOS allows only one access list to an interface.

考题 Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()A、clients connected to the rogue access point must be able to connect to the containment controller-based access point.B、multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.C、clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.D、each controller-based access point can handle only a limited amount of clients connected to the rogue access points.

考题 Which command shows if an access list is assigned to an interface?()A、show ip interface [interface] access-listsB、show ip access-lists interface [interface]C、show ip interface [interface]D、show ip access-lists [interface]

考题 What is a limitation of implementing uRPF?()A、MPLS LDP must be enabled.B、BGP routing protocol must be running.C、Named access-lists must be configured.D、Symmetrical routing is required.E、Domain name must be defined

考题 Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different…B、you can config one access list,per direction,per layer 3 protocolC、you can place as many access lists as you want on any interfaceD、you can apply ony one access list on any interface

考题 多选题Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL(Racl) is correct?()ACoPP protects against IP spoofing;Racl protects against DoS attacks.BCoPP can not use named access lists;Racl can use named access listsCCoPP applies to a dedicated control plane interface;Racl applies to all interfaces.DCoPP needs a AAA server,Racl does not need a AAA serverECoPP supports rate limits;Racl does not support rate limits

考题 多选题Which of the following are characteristics of named access lists?()AIndividual statements in a named access list may be deleted.BThey require a numbered range from 1000 to 1099.CWhen created, they must be specified as standard or extended.DThey are created with the ip access-list command.EThe entire access list must be deleted before editing.FThey are applied with the ip name-group command.

考题 多选题Which two statements regarding the FLASHBACK_TRANSACTION_QUERY view are correct?()AYou can find information about only active transactions from the viewBYou can find information about read only transactions from the viewCYou require the SELECT ANY TRANSACTION system privilege to access the viewDYou can find information about both active and committed transactions from the viewEYou require the SELECT ON FLASHBACK_TRANSACTION_QUERY object privilege to access the view

考题 单选题Which statement about access lists that are applied to an interface is true?()A you can apply multiple access lists with the same protocol or in different…B you can config one access list,per direction,per layer 3 protocolC you can placeasmanyaccess lists as you want on any interfaceD you can apply ony one access list on any interface

考题 单选题Which statement about access lists that are applied to an interface is true?()A you can apply multiple access lists with the same protocol or in different…B you can config one access list,per direction,per layer 3 protocolC you can place as many access lists as you want on any interfaceD you can apply ony one access list on any interface

考题 单选题Which statement about access lists that are applied to an interface is true?()A you can apply multiple access lists with the same protocol or in different direction.B you can config one access list,per direction,per layer 3 protocolC you can place as many access lists as you want on any interfaceD you can apply only one access list on any interface

考题 多选题Which two statements about static NAT translations are true?()AThey are always present in the NAT table.BThey allow connection to be initiated from the outside.CThey can be configured with access lists,to allow two or more connections to be initiated from the outside.DThey require no inside or outside interface markings because addresses are statically defined.

考题 多选题Which three of these statements about PPPoP are true?()AYou must install PPPoP client software on all hosts that connects to the Ethernet segment this means that the access provider must maintain a CPEBPPPoP can provide a host with access to a destination over Ethernet. You can have only one PPPoPsession per PVCCPPPoP implementation is susceptible to broadcast storms and possible denial-of-service attacksDYou cannot use PPPoP with Cisco Service Selection GatewayEPer-session accounting is possible, which allows the service provider to charge the subscribe based onsession time for various services offered. The service provider can also require a minimum access change