单选题Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()AApplication of up to three access lists per protocol to a single interface.BNo more than two access lists per interface.COne access list may be configured per direction for each Layer 3 protocol configured on an interface.DThe maximum number allowed varies due to RAM availability in the router.EAn infinite number of access lists that can be applied to an interface, from most specific to most general.FCisco IOS allows only one access list to an interface.

单选题
Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()
A

Application of up to three access lists per protocol to a single interface.

B

No more than two access lists per interface.

C

One access list may be configured per direction for each Layer 3 protocol configured on an interface.

D

The maximum number allowed varies due to RAM availability in the router.

E

An infinite number of access lists that can be applied to an interface, from most specific to most general.

F

Cisco IOS allows only one access list to an interface.


参考解析

解析: 暂无解析

相关考题:

Which statements are true regarding classless routing protocols?() A. The use of discontiguous subnets is not allowedB. The use of variable length subnet masks is permittedC. RIP v1 is a classless routing protocolD. IGRP supports classless routing within the same autonomous systemE. RIP v2 supports classless routing

Which two of these are correct regarding the recommended practice for distribution layer design based on the following configuration?() A. use a Layer 2 link between distribution switchesB. use a Layer 3 link between distribution switchesC. use a redundant link to the coreD. use a Layer 3 link between distribution switches with route summarization

Which of the following statements is TRUE regarding crane operations ________.A.Radio communications allow the crane operator to disregard the use of hand signalsB.The crane operators and signalman must be familiar with the correct hand signalsC.The forward cranes can be operated from the bridgeD.The aft cranes can be operated from the aft steering station

Which of the following statements correctly describes the characteristics of a Frame Relay point-to-point subinterface?()A、Needs to use Inverse ARP.B、Maps a single IP subnet per DLCI.C、Maps a single IP subnet across multiple DLCIs.D、Resolves NBMA (non broadcast multi access) split horizon issues.E、Requires use of the frame-relay map command.F、None of the above

For the following statements, which one is perceived as a drawback of implementing Fibre ChannelAuthentication Protocol (FCAP)?()A、It is restricted in size to only three segmentsB、It requires the use of netBT as the network protocolC、It requires the implementation of IKED、It relies on an underlying Public Key Infrastructure

Which of the following are true statements regarding the characteristics of OSPF areas? Select all that apply.()A、All OSPF networks require the use of multiple areasB、Multiple OSPF areas must connect to area 0C、Single area OSPF networks must be configured in area 1D、Areas can be assigned any number from 0 to 63535E、Area 0 is called the backbone areaF、Each OSPF area need to be configured with a loopback interface

When WebSphere Commerce, WebSphere Application Server, the web server and the database server are all located on a single machine, which of the following statements are TRUE? ()A、this is a multi-node installationB、this is a single node installation.C、each hardware and software component is a single point of failure.D、this is an example of load balancing.

Which of the following statements is true regarding the VERSIONS BETWEEN clause?()  A、 The VERSIONS BETWEEN clause may be used in DML statements.B、 The VERSIONS BETWEEN clause may be used in DDL statements.C、 The VERSIONS BETWEEN clause may not be used to query past DDL changes to tables.D、 The VERSIONS BETWEEN clause may not be used to query past DML statements to tables.

Which of the following statements is correct regarding a hybridcrypto system?()A、 uses symmetric crypto for keys distributionB、 uses symmetric crypto for proof of originC、 uses symmetric crypto for fast encrypted/decryptionD、 uses asymmetric crypto for message confidentialityE、 uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session

Which statements are true regarding classless routing protocols?()A、The use of discontiguous subnets is not allowedB、The use of variable length subnet masks is permittedC、RIP v1 is a classless routing protocolD、IGRP supports classless routing within the same autonomous systemE、RIP v2 supports classless routing

Which of the following statements regarding documentation would not be considered a helpful stepin the troubleshooting process?()A、Use the Cisco Auto Configuration toolB、Use the Cisco Rollback featureC、Automate documentationD、Schedule documentation checksE、Use the Cisco Configuration Archive toolF、Require documentation prior to a ticket being closed out

Which of the following a true statements regarding the use of VLANs to segment anetwork? ()A、They increase the size of collision domainsB、They allow logical grouping of users by function.C、They can enhance network security.D、They increase the size of the broadcast domain while decreasing the number of collision domains.E、They increase the number of broadcast domains while decreasing the size of the broadcast domains.F、They simplify switch administration.

Which of the following is a diplexer used for?()A、Allows two satellite tuners to use the same dish.B、Connects the low noise block down converter (LNB) to the multi-switch.C、Combines satellite and over the air (OTA) signals.D、Allows one LNB to use two satellites.

A server has a processor that allows it to calculate two applications at the same time. Which of the following describes this capability of the processor?()A、Dual processingB、Multi-processingC、Multi-taskingD、Multi-threading

Which of the following statements are true when creating NETBIOS names? ()A、 NETBIOS names can only use alphanumeric characters.B、 You can use a ’.’ in a NETBIOS name.C、 You can use an ’_’ (underscore) in a NETBIOS name.D、 NETBIOS names must be UPPERCASEE、 NETBIOS names can be a maximum of 32 characters

Which of the following has to be installed on a laptop in order to use a compact flash storage device?()A、a multi-media card readerB、USB 2.0 driversC、USB 1.1 driversD、an enhanced 1.44 floppy drive

Which of the following statements is true regarding implementing Live Partition Mobility on two existing POWER6 based systems?()A、The systems must use internal storage for boot purposes. B、All virtualized ethernet adapters must be numbered below 10. C、The mobile partition's network and disk access must be virtualized. D、Each system must be controlled by a different Hardware Management Console (HMC).

Which of the following is required to use Simultaneous Multi-Threading (SMT)?()A、smtctl commandB、A dual core chipC、AIX 5.3 operating system and POWER5 hardwareD、Advanced Virtualization which is a separately purchased product

Which of the following statements are true regarding the Recycle Bin?()A、 The Recycle Bin is a physical storage area for dropped objects.B、 The Recycle Bin is a logical container for dropped objects.C、 The Recycle Bin stores the results of a Flashback Drop operation.D、 The objects in the Recycle Bin are stored in the tablespace in which they were created.

单选题Which of the following is required to use Simultaneous Multi-Threading (SMT)?()Asmtctl commandBA dual core chipCAIX 5.3 operating system and POWER5 hardwareDAdvanced Virtualization which is a separately purchased product

多选题Which of the following statements are true when creating NETBIOS names? ()ANETBIOS names can only use alphanumeric characters.BYou can use a ’.’ in a NETBIOS name.CYou can use an ’_’ (underscore) in a NETBIOS name.DNETBIOS names must be UPPERCASEENETBIOS names can be a maximum of 32 characters

单选题Which of the following statements is TRUE regarding crane operations().ARadio communications allow the crane operator to disregard the use of hand signalsBThe crane operators and signalman must be familiar with the correct hand signalsCThe forward cranes can be operated from the bridgeDThe aft cranes can be operated from the aft steering station

多选题Which statements are true regarding classless routing protocols?()AThe use of discontiguous subnets is not allowedBThe use of variable length subnet masks is permittedCRIP v1 is a classless routing protocolDIGRP supports classless routing within the same autonomous systemERIP v2 supports classless routing

单选题Which of the following has to be installed on a laptop in order to use a compact flash storage device?()Aa multi-media card readerBUSB 2.0 driversCUSB 1.1 driversDan enhanced 1.44 floppy drive

单选题Which of the following statements regarding documentation would not be considered a helpful stepin the troubleshooting process?()AUse the Cisco Auto Configuration toolBUse the Cisco Rollback featureCAutomate documentationDSchedule documentation checksEUse the Cisco Configuration Archive toolFRequire documentation prior to a ticket being closed out

多选题Which of the following statements correctly describes the characteristics of a Frame Relay point-to-point subinterface?()ANeeds to use Inverse ARP.BMaps a single IP subnet per DLCI.CMaps a single IP subnet across multiple DLCIs.DResolves NBMA (non broadcast multi access) split horizon issues.ERequires use of the frame-relay map command.FNone of the above

单选题Which of the following statements is true regarding the VERSIONS BETWEEN clause?()A The VERSIONS BETWEEN clause may be used in DML statements.B The VERSIONS BETWEEN clause may be used in DDL statements.C The VERSIONS BETWEEN clause may not be used to query past DDL changes to tables.D The VERSIONS BETWEEN clause may not be used to query past DML statements to tables.

多选题Which of the following a true statements regarding the use of VLANs to segment anetwork? ()AThey increase the size of collision domainsBThey allow logical grouping of users by function.CThey can enhance network security.DThey increase the size of the broadcast domain while decreasing the number of collision domains.EThey increase the number of broadcast domains while decreasing the size of the broadcast domains.FThey simplify switch administration.