单选题Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()Ainterface Ethernet0/0 I.pv6 traffic-filter NoULA out I.pv6 access-list NoULA Deny ipv6 FC00::/8 any Permit ipv6 any anyBinterface Ethernet0/0 I.pv6 traffic-filter NoULA out I.pv6 access-list NoULA Deny ipv6 FC00::/7 anyP ermit ipv8 any anyCinterface Ethernet0/0 I.pv6 access-group NoULA out I.pv6 access-list NoULA Deny ipv6 FC00::/8 anyP ermit ipv6 any anyDinterface Ethernet0/0 I.pv6 access-group NoULA out I.pv6 access-list NoULA Deny ipv6 FC00::/7 any Permit ipv6 any any
单选题
Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()
A
interface Ethernet0/0 I.pv6 traffic-filter NoULA out I.pv6 access-list NoULA Deny ipv6 FC00::/8 any Permit ipv6 any any
B
interface Ethernet0/0 I.pv6 traffic-filter NoULA out I.pv6 access-list NoULA Deny ipv6 FC00::/7 anyP ermit ipv8 any any
C
interface Ethernet0/0 I.pv6 access-group NoULA out I.pv6 access-list NoULA Deny ipv6 FC00::/8 anyP ermit ipv6 any any
D
interface Ethernet0/0 I.pv6 access-group NoULA out I.pv6 access-list NoULA Deny ipv6 FC00::/7 any Permit ipv6 any any
参考解析
解析:
暂无解析
相关考题:
Click the Exhibit button.Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a in the HR zone to host_b in the trust zone are true? ()(Choose two.)A. DNS traffic is denied.B. HTTP traffic is denied.C. FTP traffic is permitted.D. SMTP traffic is permitted.
Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?()A.B.C.D.
Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.Which firewall filter configuration do you use?() A.B.C.D.
Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?() A. The traffic will be rejected.B. The traffic will be dropped.C. The traffic will be forwarded.D. The traffic will be policed.
Click the Exhibit button.host_a is in subnet_a and host_b is in subnet_b.Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?() A. DNS traffic is denied.B. Telnet traffic is denied.C. SMTP traffic is denied.D. Ping traffic is permitted.
Which configuration command prevents a client from establishing multiple PPPoE connections from a single workstation?() A. sessionsB. sa-validateC. split-horizonD. duplicate-protection
A Bridged 1483 network is grouping all DSL users into a single logical subnet.Which configuration command prevents the end users from directly communicating with each other?() A. no ip arpB. no ip proxy-arpC. restrict ip arpD. restrict ip proxy-arp
Refer to the exhibit. A Boston company bought th e assets of a New York company and is trying to route traffic between the two data networks using EIGRP. The show command output shows that traffic will not flow between the networks. As a network consultant, you were asked to modify the configuration a nd certify the interoperability of the two networks. For traffic to flow from subnet 172.16.8.0/24 to the 172.16.16.0/24 subnet, which configuration change do you recommend?()A. Turn off autosummarization on routers N1 and B1.B. Add IP summary addre sses to the Internet - pointing interfaces of routers N1 and B1.C. Turn off autosummarization on routers N2 and B2.D. Add wildcard masks to the network commands on routers N2 and B2.
Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()A、assigning a private IP address to the APB、changing the default SSID valueC、configuring a new administrator passwordD、changing the mixed mode setting to single modeE、configuring traffic filtering
Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.
The above bgp configuration has what effect on the configured router?()A、Allows incoming TCP connections destined to port 179B、Allows incoming TCP connections sourced from port 179C、Allows incoming TCP connections from 1.1.1.1 and destined to,or sourced from port 179D、Allows incoming TCP connections from 1.1.1.1 that are destined to port 179E、Allows incoming TCP connections from 1.1.1.1 that are sourced from port 179
A Bridged 1483 network is grouping all DSL users into a single logical subnet. Which configuration command prevents the end users from directly communicating with each other?()A、no ip arpB、no ip proxy-arpC、restrict ip arpD、restrict ip proxy-arp
Which configuration command prevents a client from establishing multiple PPPoE connections from a single workstation?()A、sessionsB、sa-validateC、split-horizonD、duplicate-protection
Which statement is correct about HTTP trickling?()A、It prevents the HTTP client or server from timing-out during an antivirus updateB、It prevents the HTTP client or server from timing-out during antivirus scanning.C、It is an attack.D、It is used to bypass antivirus scanners.
单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in azone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUSTzone to the UNTRUST zone. Which configuration would correctly accomplish this task?()A AB BC CD D
单选题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()A The traffic will be rejectedB The traffic will be droppedC The traffic will be forwardedD The traffic will be policed
单选题An electrical device which prevents an action from occurring until all other required conditions are met is called a/an ().AlimitBmonitorCmodulatorDinterlock
单选题Which statement describes the behavior of a security policy?()AThe implicit default security policy permits all traffic.BTraffic destined to the device itself always requires a security policy.CTraffic destined to the device’s incoming interface does not require a security policy.DThe factory-default configuration permits all traffic from all interfaces.
单选题Which configuration command prevents a client from establishing multiple PPPoE connections from a single workstation?()AsessionsBsa-validateCsplit-horizonDduplicate-protection
多选题Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()Aassigning a private IP address to the APBchanging the default SSID valueCconfiguring a new administrator passwordDchanging the mixed mode setting to single modeEconfiguring traffic filtering
单选题A Bridged 1483 network is grouping all DSL users into a single logical subnet. Which configuration command prevents the end users from directly communicating with each other?()Ano ip arpBno ip proxy-arpCrestrict ip arpDrestrict ip proxy-arp
多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
多选题Which three statements best describe HSRP configuration on Cisco Nexus switches?()AIn a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic. No additional configuration is required.BIn a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic if the peer-gateway feature is enabled.CYou can configure two overlapping HSRP groups to load share traffic from the connected hosts while providing the default router redundancy.DYou can use the show standby command to verify HSRP operation and configuration.EIf you remove the feature hsrp command, all relevant HSRP configuration information isalso removed.
单选题The step of a pilot ladder which prevents the ladder from twisting is the().Aproof barBshifting barClong barDspreader
单选题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()A The traffic will be rejected.B The traffic will be dropped.C The traffic will be forwarded.D The traffic will be policed.