单选题You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines. What command would assign this access- list to the Virtual Terminal Lines?()Arouter(config-line)# ip access-group 1 inBrouter(config-line)# access-class 1 inCrouter(config-line)# ip access-list 1 inDrouter(config-line)# access-line 1 in

单选题
You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines. What command would assign this access- list to the Virtual Terminal Lines?()
A

router(config-line)# ip access-group 1 in

B

router(config-line)# access-class 1 in

C

router(config-line)# ip access-list 1 in

D

router(config-line)# access-line 1 in


参考解析

解析: 暂无解析

相关考题:

After working all night and successfully configuring a Cisco router for the Ezonexam network you save your changes on the startup config, reboot the router, and go out for a cigarette. When you return, none of your changes are active and the router boots to the initial configuration mode! Which of the choices below indicates the source of your problem?A.Hardware failure in NVRAM prevents the router from loading the configB.Startup-config in flash is corrupt and cannot be analyzedC.Router configuration-register set to bypass startup configurationD.Startup-config in NVRAM is corrupt and cannot be analyzedE.None of the above

You are trying to connect directly into the LAN prot of a Ezonexam router. You want to telnet to the local Cisco router using TCP/IP but cannot create a session.What should you do to resolve the problem?A. Use a straight-through cable to connect your computer's COM port to the router's console port.B. Use a crossover cable to connect your computer's COM port to the router's console port.C. Use a straight-through cable to connect your computer's COM port to the router's Ethernet port.D. Use a crossover cable to connect your computer's Ethernet port to the router's Ethernet port.E. Use a rollover cable to connect your computer's Ethernet port to the router's Ethernet port.F. Use a straight-through cable to connect your computer's Ethernet port to the router's Ethernet port.G. None of the above

You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with the IP protocol stack in your PC. Which of the following actions is most likely to confirm your diagnosis?A. ping 127.0.0.0B. ping 203.125.12.1C. telnet 127.0.0.1D. ping 127.0.0.1E. tracert 203.125.12.1F. None of the above

You are logged into a router and wish to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces?A. show ip linksB. show cdp neighborC. show cdp neighbor detailD. show ip clientsE. show ip routeF. None of the above

You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()A.AB.BC.CD.D

After attempting to telnet into a router, you are denied and you receive the error message "password required, but none set." What configuration changes will allow telnet access into this router?() A.B.C.D.

You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A. show access-listB. show ip access-listC. show ip interfaceD. show interfaceE. show interface list

You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command ip access-group 101 in to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()A. Telnet sessions from host A to host 5.1.1.10B. Telnet sessions from host A to host 5.1.3.10C. Telnet sessions from host B to host 5.1.2.10D. Telnet sessions from host B to host 5.1.3.8E. Telnet sessions from host C to host 5.1.3.10F. Telnet sessions from host F to host 5.1.1.10

You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines.What command would assign this access- list to the Virtual Terminal Lines?()A. router(config-line)# ip access-group 1 inB. router(config-line)# access-class 1 inC. router(config-line)# ip access-list 1 inD. router(config-line)# access-line 1 in

You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?() A.5B.10C.14D.20

You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?()A、5B、10C、14D、20

You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with your protocol stack. Which of the following actions is most likely to confirm your diagnosis?()A、ping 127.0.0.0B、ping 203.125.12.1C、telnet 127.0.0.1D、ping 127.0.0.1E、tracert 203.125.12.1

You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A、show access-listB、show ip access-listC、show ip interfaceD、show interfaceE、show interface list

After working all night and successfully configuring a Cisco router for the TestKing network you save your changes on the startup config, reboot the router, and go out for a cigarette. When you return, none of your changes are active and the router boots to the initial configuration mode! Which of the choices below indicates the source of your problem?()A、Hardware failure in NVRAM prevents the router from loading the configB、Startup-config in flash is corrupt and cannot be analyzedC、Router configuration-register set to bypass startup configurationD、Startup-config in NVRAM is corrupt and cannot be analyzedE、None of the above

You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines. What command would assign this access- list to the Virtual Terminal Lines?()A、router(config-line)# ip access-group 1 inB、router(config-line)# access-class 1 inC、router(config-line)# ip access-list 1 inD、router(config-line)# access-line 1 in

Which Cisco SDM feature allows you to specify whether you want SDM files installed on your PC or on your router?()  A、 Install Shield WizardB、 Cisco SDM Express WizardC、 Cisco SDM Image ManagerD、 Create Connection Wizard

单选题Which of the following Frame-Relay encapsulation commands would you use, if you had to connect your Cisco router to a non-Cisco router?()ATestKRouter(config-if)# Encapsulation frame-relay dot1qBTestKRouter(config-if)# Encapsulation frame-relay aal5snapCTestKRouter(config-if)# Encapsulation frame-relay ietfDTestKRouter(config-if)# Encapsulation frame-relay islENone of the above

单选题After working all night and successfully configuring a Cisco router for the TestKing network you save your changes on the startup config, reboot the router, and go out for a cigarette. When you return, none of your changes are active and the router boots to the initial configuration mode! Which of the choices below indicates the source of your problem?()AHardware failure in NVRAM prevents the router from loading the configBStartup-config in flash is corrupt and cannot be analyzedCRouter configuration-register set to bypass startup configurationDStartup-config in NVRAM is corrupt and cannot be analyzedENone of the above

单选题You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?()A5B10C14D20

单选题You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with your protocol stack. Which of the following actions is most likely to confirm your diagnosis?()Aping 127.0.0.0Bping 203.125.12.1Ctelnet 127.0.0.1Dping 127.0.0.1Etracert 203.125.12.1

多选题You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()AAdministratively shut down the interface.BPhysically secure the interface.CCreate an access list and apply it to the virtual terminal interfaces with the access-group command.DConfigure a virtual terminal password and login process.EEnter an access list and apply it to the virtual terminal interfaces using the access-class command.

单选题How can you verify that you have correctly configured SSH access to your Junos device?()Auser@router# show system servicesBuser@router show configuration servicesCuser@router# show configuration system servicesDuser@router# show system login

单选题When you access the Cisco CRS Administration page for the first time in a cluster, the system automatically initiates the cluster setup procedure. You perform this procedure one time for a cluster. Whatdo you accomplish in this procedure?()Aidentify your Cisco CRS license files and location, enter information about your LDAP, and designate a Cisco CRS administrator Bidentify CSQs and JTAPI user and designate a Cisco CRS administrator Cidentify resources and RM user and enter information about your LDAP Didentify your Cisco CRS license files and location, enter information about your LDAP, and designate IPCC Express resources

单选题You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()Ashow access-listBshow ip access-listCshow ip interfaceDshow interfaceEshow interface list

单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()AConfigure the network category of your wireless network connection to Private.BConfigure the network category of your wireless network connection to Public.CConfigure the TCP/IP packet filtering on the wireless network connection.DConfigure the wireless network connection with the appropriate authentication to the router.

单选题Which Cisco SDM feature allows you to specify whether you want SDM files installed on your PC or on your router?()A Install Shield WizardB Cisco SDM Express WizardC Cisco SDM Image ManagerD Create Connection Wizard