单选题Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()AThe ACL applied to the vty lines has no in or out option like ACL being applied to an interface.BThe ACL is applied to the Telnet port with the ip access-group command.CThe ACL must be applied to each vty line individually.DThe ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.

单选题
Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()
A

The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.

B

The ACL is applied to the Telnet port with the ip access-group command.

C

The ACL must be applied to each vty line individually.

D

The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.


参考解析

解析: 暂无解析

相关考题:

When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?() A. HostnameB. fully qualified domain nameC. IP addressD. address book entry

Which statement describes VRRP object tracking?() A.It monitors traffic flow and link utilization.B.It ensures the best VRRP router is the virtual router master for the group.C.It causes traffic to dynamically move to higher bandwidth linksD.It thwarts man-in-the-middle attacks.

When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?()A、Wireless Control SystemB、Wireless clientsC、Wireless controllersD、Control-based access pointsE、Location Appliance

Which statement describes VRRP object tracking?()A、It monitors traffic flow and link utilization.B、It ensures the best VRRP router is the virtual router master for the group.C、It causes traffic to dynamically move to higher bandwidth linksD、It thwarts man-in-the-middle attacks.

Which statement best describes what Cisco Smart Care Service provides?()A、bundled technical support and maintenance for Cisco networksB、bundled, unlimited support with the purchase of any Cisco productC、technical support, maintenance, and monitoring to Cisco networksD、fee-based add-on support and tech-to-tech assistance for Cisco products

A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()A、are optionalB、are used to protect data beansC、provide coarse-grained access controlD、never specify a relationship

You issue this statement:ALTER DATABASE BACKUP CONTROLFILE TO TRACE;  What does the statement generate?()A、A text copy of the control file.B、A binary copy of the control file.C、A file containing a SQL statement which will re-create the database.D、A file containing a SQL statement which will re-create the control file.

Ⅲ. There are four choices following each statement. Mark the choice that can best complete the statement: If a linguistic study describes and analyzes the language people actually use, it is said to be ()A、prescriptiveB、analyticC、descriptiveD、linguistic

Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()A、The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.B、The ACL is applied to the Telnet port with the ip access-group command.C、The ACL must be applied to each vty line individually.D、The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.

When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?()A、Wireless Control SystemB、wireless clientsC、wireless controllersD、controller-based access pointsE、Location Appliance

When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()A、 platinum, gold, silver, and bronzeB、 voice, gold, silver, and bronzeC、 low delay, network critical, business, best effortD、 voice, video, background gold, background silver, and best effortE、 voice, video, best effort, and backgroundF、 voice, video, best effort, background, and scavenger

Which of the following BEST describes RAID 1?()A、MirroringB、StripingC、Striping with parityD、Striping with mirroring

A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()A、are mandatoryB、specify action group ExecuteCommandActionGroup for Controller commandsC、specify action group ViewCommandActionGroup for View commandsD、specify resource group ControllerCommandResourceGroup for Controller commandsE、specify resource group ViewCommandResourceGroup for View commands

Which of the following best describes how locks are used in DB2?()A、To maintain control of updated rows for commit processingB、To ensure only committed changes are altered by another applicationC、To allow two applications to update the same row of data simultaneouslyD、To prevent multiple applications from accessing the same data simultaneously

多选题A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()AAdd the switch to the Junos Pulse Access Control Service as a standard RADIUS.BAdd the switch to the Junos Pulse Access Control Service using the Any make/model.CAdd the switch as a firewall enforcer.DObtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.

单选题When configuring Cisco Secure ACS to support wireless EAP authentication,which device mustbeconfigured as a AAA client?()ALocation ApplianceBcontroller-based access pointsCwireless clientsDWireless Control SystemEwireless controllers

多选题A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-grained access controlDnever specify a relationship

单选题You issue this statement:ALTER DATABASE BACKUP CONTROLFILE TO TRACE;  What does the statement generate?()AA text copy of the control file.BA binary copy of the control file.CA file containing a SQL statement which will re-create the database.DA file containing a SQL statement which will re-create the control file.

单选题Which statement most accurately describes the implementation of a SQL Access Advisor recommendation?()A SQL Access Advisor recommendations are automatically implemented.B Individual SQL Access Advisor recommendations can be scheduled for implementation.C All SQL Access Advisor recommendations for a specific task must be implemented at the same time.D SQL Access Advisor recommendations are automatically scheduled for implementation during the maintenance window.E None of the above.

单选题Which statement most accurately describes the implementation of a SQL Access Advisor recommendation?()ASQL Access Advisor recommendations are automatically implemented.BIndividual SQL Access Advisor recommendations can be scheduled for implementation.CAll SQL Access Advisor recommendations for a specific task must be implemented at the same time.DSQL Access Advisor recommendations are automatically scheduled for implementation during the maintenance window.ENone of the above.

单选题When configuring Cisco Secure ACS to support wireless EAP authentication,which device must beconfigured as a AAA client?()ALocation ApplianceBcontroller-based access pointsCwireless clientsDWireless Control SystemEwireless controllers

单选题Which statement best describes clustering in a small-business wireless network?()A allows multiple access points to be connected wirelessly, without the need for a wired Ethernet networkB replicates configuration parameters across access points in the cluster, while optimizing network performanceC automatically configures wireless client devices via Wi-Fi Protected SetupD can get real-time traffic or bandwidth statistics from an access point within a cluster

单选题When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()AHostnameBfully qualified domain nameCIP addressDaddress book entry

单选题Which of the following best describes a full backup? ()AAll datafiles of a database BAll datafiles, archive logs, and control files CAll datafiles and control files DAll the used blocks in a datafile