多选题When testing ICMP access to a functional load-balancing ACE VIP, it fails. What is the reason of this problem? ()AThe interface is shut downBAn access list is denying ICMPCRouting is not configured properlyDvip icmp-reply is inactive

多选题
When testing ICMP access to a functional load-balancing ACE VIP, it fails. What is the reason of this problem? ()
A

The interface is shut down

B

An access list is denying ICMP

C

Routing is not configured properly

D

vip icmp-reply is inactive


参考解析

解析: 暂无解析

相关考题:

定义一个用于封禁ICMP协议而只允许转发166.129.130.0/24子网的ICMP数据包的访问控制列表,Cisco路由器的正确配置是( )。A) access-list 198 permit icmp 166.129.130.0 255.255.255.0 anyaccess-list 198 deny icmp any anyaccess-list 198 permit ip any anyB) access-list 198 permit icmp 166.129.130.0 0.0.0 255 anyaccess-list 198 deny icmp any anyaccess-list 198 permit ip any anyC) access-list 99 permit icmp 166.129.130.0 0.0.0 255 anyaccess-list 99 deny icmp any anyaccess-list 99 permit ip any anyD) access-list 100 permit icmp 166.129.130.0 0.0.0 255 anyaccess-list 100 pernut ip any anyaccess-list 100 deny icmp any any

定义一个用于封禁ICMP协议而只允许转发166.129.130.0/24子网的ICMP数据包的访问控制列表,Cisco路由器的正确配置是A.access-list 198 permit icmp 166.129.130.0 255.255.255.0 any access-list 198 deny icmp any any access-list 198 permit ip any anyB.access-list 198 permit icmp 166.129.130.0 0.0.0.255 any access-list 198 deny icmp any any access-list 198 permit ip any anyC.access-list 99 permit icmp 166.129.130:0 0.0.0.255 any access-list 99 deny icnip any any access-list 99 permit ip any anyD.access-list 100 permit icmp 166.129.130.0 0.0.0.255 any access-list 100 permit ip any any access-list 100 deny icmp any any

用扩展访问控制列表配置封禁ICMP协议,只允许l68.27.95.0/24子网的ICMP数据包通过路由器,正确的配置是(61) 。A.access-list 90 deny icmp l68.27.95.0 255.255.255.0 any access-list 90 deny icmp any anyaccess—list 90 permit ip any anyB.access-list l00 permit icmp l68.27.95.0 0.0.0.255 any access-list l00 permit ip any anyC.access—list l l o permit icmp l68.27.95.0 255.255.255.0 any access—list l lo deny icmp any anyD.access-list l20 permit icmp l68.27.95.0 0.0.0.255 any access—list l20 deny icmp any any access—list l20 permit ip any any

●Functional testing tests whether the output is the expected (71) with the valid input.(71) A.reasonB.resultC.outcomeD.record

若要求路由器的某接口上只封禁ICMP协议,但允许159.67.183.0/24子网的ICMP数据包通过,那么使用的access-list命令是______。A.access-list 120 deny icmp 159.67.183.0 0.0.0.255 any access-list 120 permit ip any anyB.access-list 10 permit icmp 159.67.183.0 0.0.0.255 any access-list 10 deny icmp any any access-list 10 permit ip any anyC.access-list 99 permit icmp 159.67.183.0 0.0.0.255 any access-list 99 deny icmp any anyD.access-list 110 permit icmp 159.67.183.0 0.0.0.255 any access-list 110 deny icmp any any access-list 110 permit ip any any

封禁ICMP协议,只转发212.78.170.166/27所在子网的所有站点的ICMP数据包,正确的access-list配置是______。A) Router(config)#access-list 110 permit icmp 212.78.170.166 0.0.0.0 anyRouter(config)#access-list 110 deny icmp any anyRouter(config)#access-list 110 permit ip any anyB) Router(config)#access-list 110 permit icmp 212.78.170.0 255.255.255.224 anyRouter(config)#access-list 110 permit ip any anyRouter(config)#access-list 110 deny icmp any anyC) Router(config)#access-list 110 perimt iemp 212.78.170.0 0.0.0.255 anyRouter(config)#access-list 110 deny icmp any anyRouter(config)#access-list 110 permit ip any anyD) Router(config)#access-list 110 permit icmp 212.78.170.160 0.0.0.31 anyRouter(config)#access-list 110 deny icmp any anyRouter(config)#access-list 110 permit ip any anyA.B.C.D.

XP is (71) of interesting twists that encourage one to think--for example, how about "Test and then code"? I've worked with software companies and a few IT organizations in (72) programmer performance was measured on lines of code delivered and testing was measured on defects found-- (73) side was motivated to reduce the number of defects prior to testing. XP uses two types of testing: unit and functional. (74) , the practice for unit testing involves developing the test for the feature prior to writing the code and further states that the tests should be automated. Once the code is written, it is immediately (75) to the test suite bringing instant feedback.A.filledB.stuffC.packD.full

When you use the ping command to send ICMP messages across a network, what's the most common request/reply pair you'll see? (Select one answer choice)A.Echo request and Echo replyB.ICMP hold and ICMP sendC.ICMP request and ICMP replyD.Echo off and Echo onE.None of the above

定义一个用于封禁ICMP协议而只允许转发l66.129.130.0/24子网的ICMP数据包的访问控制列表,Cisc0路由器的正确配置是( )。A.access-list 198 permit icmp 166.129.130.0 255.255.255.0 anyaccess-list 198 deny iemp any anyaccess-list 198 permit ip any anyB.access-list 198 permit icmp 166.129.130.0 0.0.0.255 anyaccess-list 198 deny iemp any anyaccess-list 198 permit ip any anyC.access-list 99 permit icmp 166.129.130.0 0.0.0.255 anyaccess-list 99 deny iemp any anyaccess-list 99 permit ip any anyD.access-list 100 permit icmp 166.129.130.0 0.0.0.255 anyaccess-list 100 permit ip any anyaccess-list 100 deny icmp any any

Functional testing tests whether the output is the expected(75)with the valid input.A.reasonB.resultC.outcomeD.record

Which of the following is true of an ACL when a packet matching an ACE is found?() A. The matching ACE is skipped to allow all other ACEs to be examined.B. The matching ACE is processed and then the last ACE is examined.C. The matching ACE is processed and then the next ACE is examined.D. The matching ACE is processed and the next packet is examined

When would you want to disable souce-route and icmp on a router of interface?

Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A、 Routed mode requires the ACE run OSPF or EIGRPB、 Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC、 Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD、 One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

Which of the following is true of an ACL when a packet matching an ACE is found?()A、The matching ACE is skipped to allow all other ACEs to be examined.B、The matching ACE is processed and then the last ACE is examined.C、The matching ACE is processed and then the next ACE is examined.D、The matching ACE is processed and the next packet is examined

When testing ICMP access to a functional load-balancing ACE VIP, it fails. What is the reason of this problem? ()A、 The interface is shut downB、 An access list is denying ICMPC、 Routing is not configured properlyD、 vip icmp-reply is inactive

When is a first-hop redundancy protocol needed in the distribution layer?()A、 when the design implements Layer 2 between the access arid distribution blocksB、 when multiple vendor devices need to be supportedC、 when preempt tuning of the default gateway is neededD、 when a robust method of backing up the default gateway is neededE、 when the design implements Layer 2 between the access switch and the distribution blocksF、 when the design implements Layer 2 between the access and distribution blocks

下面ACL语句中,表达“禁止外网和内网之间互相ping”的是 () 。 A、access-list 101 permit any anyB、access-list 101 permit icmp any anyC、access-list 101 deny any anyD、access-list 101 deny icmp any any

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

单选题Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A Routed mode requires the ACE run OSPF or EIGRPB Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

单选题You are the network administrator for Your network consists of two Active Directory domains in a single forest. All network servers run Windows Server 2003. Currently, you use more than 1,000 security groups. A member server named TK1 contains a folder named Testing. This folder contains resources required by users in the engineering department. A written security policy states that engineering users must have the approval of the management group before they can be assigned the Full Control NTFS permission on Testing. You need to discover whether any engineering users currently have the Full Control NTFS permission on Testing. You must complete this task by using the minimum amount of administrative effort. What should you do?()AUse Active Directory Users and Computers to view the access level available to engineering users.BUse the Find Users, Contacts, and Groups utility to view the membership of each group that has access to Testing.CIn the properties of Testing, view the Effective Permissions tab.DWrite an ADSI script to search for members of all groups that have access to testing

问答题When would you want to disable souce-route and icmp on a router of interface?

单选题How would you characterize the source and type in a denial of service attack on a router?()ABy perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesBBy performing a show interface to see the transmitted load txload and receive load rxload ;if the interface utilization is not maxed out ,there is no attack underwayCBy setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attackDBy applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail

单选题Which of the following tools should Mike, a technician, use when testing a serial port?()ACable testerBMultimeterCLoopback plugDLogic probe

单选题Which of the following is true of an ACL when a packet matching an ACE is found?()AThe matching ACE is skipped to allow all other ACEs to be examined.BThe matching ACE is processed and then the last ACE is examined.CThe matching ACE is processed and then the next ACE is examined.DThe matching ACE is processed and the next packet is examined

单选题When is a first-hop redundancy protocol needed in the distribution layer?()A when the design implements Layer 2 between the access arid distribution blocksB when multiple vendor devices need to be supportedC when preempt tuning of the default gateway is neededD when a robust method of backing up the default gateway is neededE when the design implements Layer 2 between the access switch and the distribution blocksF when the design implements Layer 2 between the access and distribution blocks

单选题According to the functional requirements for a Safety Management System, every company should develop, () and () a SMS.Aimplement;verifyBmaintain;improveCimplement;maintainDreview;access

单选题In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()AVIP is not required when using only agentless access for all endpoint platforms.BVIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.CVIP is not required when using Junos Pulse and agentless access for all endpoint platforms.DVIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.