An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()A、FTPB、TelnetC、SMTPD、DNSE、HTTPF、POP3

An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()

  • A、FTP
  • B、Telnet
  • C、SMTP
  • D、DNS
  • E、HTTP
  • F、POP3

相关考题:

AWindowsAzureapplicationisactivatedforWindowsAzureConnectAcorporatepolicyblocksInternettrafficforlocalservers.YouneedtorecommendthefirewallrulethatwillallowWindowsAzureConnecttrafficforlocalservers.Whatshouldyourecommend?()A.AllowTCPport443inbound.B.AllowTCPport3389outbound.C.AllowTCPport3389inbound.D.AllowTCPport443outbound.

What is a Host Enforcer policy?() A. A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.B. A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.C. A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.D. A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.

Your ERX Edge Router is using an inbound route-map for an EBGP peer to only accept routes in the range of 192.168.32.0 through 192.168.95.255. The route-map references an access list named test .What accurately accomplishes the goal of the route-map?()A. access-list test 192.168.32.0 0.0.63.255B. access-list test permit 192.168.32.0 0.0.64.255C. access-list test permit 192.168.32.0 0.0.63.255D. access-list test permit 192.168.32.0 255.255.63.0

In a base e-Commerce module design, which routing statement is correct?() A. Routing is mostly static.B. Hardcoded IP addresses are used to support failover.C. Inbound servers use the CSM or ACE as the default gateway.D. VLANs between the access layer switches are used for FHRP protocols.

An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。A、FTPB、TelnetC、SMTPD、DNSE、HTTPF、POP3

What is a Host Enforcer policy?()A、A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.B、A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.C、A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.D、A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.

You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()A、as an outbound filter on interface fxp0B、as an outbound filter on interface lo0C、as an inbound filter on interface fxp0D、as an inbound filter on interface lo0

Your ERX Edge Router is using an inbound route-map for an EBGP peer to only accept routes in the range of 192.168.32.0 through 192.168.95.255. The route-map references an access list named test . What accurately accomplishes the goal of the route-map?()A、access-list test 192.168.32.0 0.0.63.255B、access-list test permit 192.168.32.0 0.0.64.255C、access-list test permit 192.168.32.0 0.0.63.255D、access-list test permit 192.168.32.0 255.255.63.0

On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic will be allowed through this interface?()A、SMTPB、DNSC、FTPD、TelnetE、HTTPF、POP3

Which three statements accurately describe IOS Firewall configurations?()A、The IP inspection rule can be applied in the inbound direction on the secured interfaceB、The IP inspection rule can be applied in the outbound direction on the unsecured interfaceC、The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.D、For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

When are packets processed in an inbound access list?()A、Before they are routed to an outbound interface.B、After they are routed for outbound traffic.C、After they are routed to an outbound interface while queuing.D、Before and after they are routed to an outbound interface.E、Depends on the configuration of the interfaceF、None of the above

In a base e-Commerce module design, which routing statement is correct?()A、Routing is mostly static.B、Hardcoded IP addresses are used to support failover.C、Inbound servers use the CSM or ACE as the default gateway.D、VLANs between the access layer switches are used for FHRP protocols.

You are the Cisco Network Designer in Cisco.com. You are designing an e-Commerce module, which routing statement is correct?()A、Routing is mostly static.B、Hardcoded IP addresses are used to support failover.C、Inbound servers use the CSM or ACE as the default gateway.D、VLANs between the access layer switches are used for FHRP protocols.

An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL? ()A、FTPB、TelnetC、SMTPD、DNSE、HTTPF、POP3

使配置的访问列表应用到接口上的命令是什么?()A、access-groupB、access-listC、aclD、firewall packet-filter xxxx inbound/outbound

You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

单选题A company has a BGP network and a BGP route of 196.27.125.0/24 that should be propagated toall of the devices. The route is not now in any of the routing tables. The administrator determinesthat an access list is the cause of the problem. The administrator changes the access list to allowthis route, but the route still does not appear in any of the routing tables. What should be done topropagate this route?()AClear the BGP sessionBChange both the inbound and outbound policy related to this routeCUse the service-policy command to adjust the QOS policy to allow the route to propagateDUse the release BGP routing command

单选题What is a Host Enforcer policy?()AA policy that is defined on the endpoint that permits or denies inbound or outbound traffic.BA policy that is sent to the endpoint that permits or denies inbound or outbound traffic.CA policy that is sent to the protected resource that permits or denies inbound or outbound traffic.DA policy that is defined on the protected resource that permits or denies inbound or outbound traffic.

多选题An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()AFTPBTelnetCSMTPDDNSEHTTPFPOP3

多选题An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。AFTPBTelnetCSMTPDDNSEHTTPFPOP3

多选题An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL? ()AFTPBTelnetCSMTPDDNSEHTTPFPOP3

单选题You need to control SSH. HTTP, and Telnet access to an MX240 router through any interface. You have decided to use a firewall filter. How should you apply the firewall filter?()Aas an outbound filter on interface fxp0Bas an outbound filter on interface lo0Cas an inbound filter on interface fxp0Das an inbound filter on interface lo0

单选题When are packets processed in an inbound access list?()ABefore they are routed to an outbound interface.BAfter they are routed for outbound traffic.CAfter they are routed to an outbound interface while queuing.DBefore and after they are routed to an outbound interface.EDepends on the configuration of the interfaceFNone of the above

多选题Which two statements describe the purpose of a security policy?()AIt enables traffic counting and logging.BIt enforces a set of rules for transit traffic.CIt controls host inbound services on a zone.DIt controls administrator rights to access the device.

单选题You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()Aas an outbound filter on interface fxp0Bas an outbound filter on interface lo0Cas an inbound filter on interface fxp0Das an inbound filter on interface lo0

单选题In a base e-Commerce module design, which routing statement is correct?()A Routing is mostly static.B Hardcoded IP addresses are used to support failover.C Inbound servers use the CSM or ACE as the default gateway.D VLANs between the access layer switches are used for FHRP protocols.

单选题You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B Allow all inbound VPN traffic to pass through the perimeter firewall only.C Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.