Which of the following is true of an ACL when a packet matching an ACE is found?()A、The matching ACE is skipped to allow all other ACEs to be examined.B、The matching ACE is processed and then the last ACE is examined.C、The matching ACE is processed and then the next ACE is examined.D、The matching ACE is processed and the next packet is examined

Which of the following is true of an ACL when a packet matching an ACE is found?()

  • A、The matching ACE is skipped to allow all other ACEs to be examined.
  • B、The matching ACE is processed and then the last ACE is examined.
  • C、The matching ACE is processed and then the next ACE is examined.
  • D、The matching ACE is processed and the next packet is examined

相关考题:

适合腔镜手术使用的强生超声止血刀头型号是:()。 A.ACE36PB.ACE23PC.ACE14PD.WAVE18S

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.) A. Traffic is permitted from the trust zone to the untrust zone.B. Intrazone traffic in the trust zone is permitted.C. All traffic through the device is denied.D. The policy is matched only when no other matching policies are found.

Which two tasks are accomplished by the firewall filter shown in the exhibit?() A. Traffic matching the my-policy term will be counted and accepted.B. Traffic matching the my-policy term will be counted and discarded.C. Traffic not matching the my-policy term will be discarded.D. Traffic not matching the my-policy term will be accepted.

Assuming both paths shown in the exhibit are available, which statement is correct?() A. Traffic matching the default route will use 10.1.1.1 as the next hop.B. Traffic matching the default route will use 10.1.1.254 as the next hop.C. Traffic matching the default route will be load-balanced per packet across both next hops.D. Traffic matching the default route will be load-balanced per flow across both next hops.

Which of the following is true of an ACL when a packet matching an ACE is found?() A. The matching ACE is skipped to allow all other ACEs to be examined.B. The matching ACE is processed and then the last ACE is examined.C. The matching ACE is processed and then the next ACE is examined.D. The matching ACE is processed and the next packet is examined

Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network.Which of the following answers best describes the router‘s logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()A. When the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceB. When routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceC. When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceD. When permitted by an ACL that was referenced in the associated crypto map

Refer to the exhibit. On the basis of the partial configuration, which two statements are correct? () A. Only routes 10.0.1.0/24 will be sent out all interfaces.B. Only routes matching 10.0.0.0/8 will be advertised out interfaces other than Ethernet 0.C. Only routes matching 10.0.0.0/8 will be advertised out Ethernet 0.D. Only routes matching 10.0.1.0/24 will be advertised out Ethernet 0.E. Only routes 10.0.1.0/24 will be allowed in the routing table.F. All rout es will be advertised out interfaces other than Ethernet 0.

The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.0 0.0.0.255 any What is the effect of this access list configuration?() A. permit all packets matching the first three octets of the source address to all destinationsB. permit all packet matching the last octet of the destination address and accept all source addressesC. permit all packet matching the host bits in the source address to all destinationsD. permit all packet from the third subnet of the network address to all destinations

The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?() A.ermit all packet smatching the first three octets of the source address to all destinationsB.permit all packet matching the last octet of the destination address and accept all source addressesC.permit all packet matching the host bits in the source address to all destinationsD.permit all packet from the third subnet of the network address to all destinations

The following configuration line was added to router R1Access-list 101 permit ip 10.25.30.00.0.0.255 anyWhat is the effect of this access list configuration?() A.ermit all packets matching the first three octets of the source address to all destinationsB.permit all packet matching the last octet of the destination address and accept all source addressesC.permit all packet matching the host bits in the source address to all destinationsD.permit all packet from the third subnet of the network address to all destinations

What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。 A.permit all packets matching the first three octets of the source address to all destinationsB.permit all packets matching the last octet of the destination address and accept all source addressesC.permit all packets from the third subnet of the network address to all destinationsD.permit all packets matching the host bits in the source address to all destinationsE.permit all packets to destinations matching the first three octets in the destination address

The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()A、ermit all packet smatching the first three octets of the source address to all destinationsB、permit all packet matching the last octet of the destination address and accept all source addressesC、permit all packet matching the host bits in the source address to all destinationsD、permit all packet from the third subnet of the network address to all destinations

The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()A、ermit all packets matching the first three octets of the source address to all destinationsB、permit all packet matching the last octet of the destination address and accept all source addressesC、permit all packet matching the host bits in the source address to all destinationsD、permit all packet from the third subnet of the network address to all destinations

Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network. Which of the following answers best describes the router's logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()A、When the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceB、When routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceC、When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceD、When permitted by an ACL that was referenced in the associated crypto map

Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A、 Routed mode requires the ACE run OSPF or EIGRPB、 Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC、 Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD、 One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

定净交换功率控制方式的区域控制偏差(ACE)数学表达式为()。A、ACE=△PB、ACE=10B△fC、ACE=10B△f+△PD、ACE=B△f

ACE是Area Control Error即区域控制误差的简称,其计算公式为()。其中△PT为联络线功率交换误差,△f为频率偏差,β为偏差系数。A、ACE=β△PT+△fB、ACE=β(△PT+△F.C、ACE=β△PT/△fD、ACE=△PT+β△f

Which two statements about an interface configured with the asr-group command are correct?()A、The FWSM supports up to 16 asymmetric routing groups.B、If a matching packet is not found, the packet is dropped.C、Asymetric routing of return traffic is enabled.D、If a matching packet is found, the Layer 3 header is rewritten.E、If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.

What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。A、permit all packets matching the first three octets of the source address to all destinationsB、permit all packets matching the last octet of the destination address and accept all source addressesC、permit all packets from the third subnet of the network address to all destinationsD、permit all packets matching the host bits in the source address to all destinationsE、permit all packets to destinations matching the first three octets in the destination address

What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()A、The best match of the ACL entries will be used for granularity of control.B、They use source IP information for matching operations.C、They use source and destination IP information for matching operations.D、They use source IP information along with protocol-type information for finer granularity of control.

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.

单选题What is the effect of the following access list condition?  access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。Apermit all packets matching the first three octets of the source address to all destinationsBpermit all packets matching the last octet of the destination address and accept all source addressesCpermit all packets from the third subnet of the network address to all destinationsDpermit all packets matching the host bits in the source address to all destinationsEpermit all packets to destinations matching the first three octets in the destination address

单选题Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A Routed mode requires the ACE run OSPF or EIGRPB Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

单选题Which of the following is true of an ACL when a packet matching an ACE is found?()AThe matching ACE is skipped to allow all other ACEs to be examined.BThe matching ACE is processed and then the last ACE is examined.CThe matching ACE is processed and then the next ACE is examined.DThe matching ACE is processed and the next packet is examined

单选题Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network. Which of the following answers best describes the router's logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()AWhen the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceBWhen routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceCWhen routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceDWhen permitted by an ACL that was referenced in the associated crypto map

多选题Which two statements about an interface configured with the asr-group command are correct?()AThe FWSM supports up to 16 asymmetric routing groups.BIf a matching packet is not found, the packet is dropped.CAsymetric routing of return traffic is enabled.DIf a matching packet is found, the Layer 3 header is rewritten.EIf a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.

单选题Assuming both paths shown in the exhibit are available, which statement is correct?()A Traffic matching the default route will use 10.1.1.1 as the next hop.B Traffic matching the default route will use 10.1.1.254 as the next hop.C Traffic matching the default route will be load-balanced per packet across both next hops.D Traffic matching the default route will be load-balanced per flow across both next hops.