The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()A、ermit all packets matching the first three octets of the source address to all destinationsB、permit all packet matching the last octet of the destination address and accept all source addressesC、permit all packet matching the host bits in the source address to all destinationsD、permit all packet from the third subnet of the network address to all destinations

The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()

  • A、ermit all packets matching the first three octets of the source address to all destinations
  • B、permit all packet matching the last octet of the destination address and accept all source addresses
  • C、permit all packet matching the host bits in the source address to all destinations
  • D、permit all packet from the third subnet of the network address to all destinations

相关考题:

Is Lin Lin in Class 3? No, she isn't.()

Given the following router output,which configuration file will the router use at its next reload?() A.configB.clientqos.cnfC.startup-configD.running-configuration

Which of the following should an administrator do after running a command from the console onthe perimeter router?() A. Update the configuration logsB. Update the network wiring schematicsC. Update the network configuration proceduresD. Compare the configuration with the baseline

An engineer is preparing an implementation plan in which the configuration needs to influence BGP‘s choice of best path.Which of the following is least likely to be used by the configuration in this imple mentation plan?()A. WeightB. Origin codeC. AS_PathD. Local_Pref

The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?() A. The default administrative distance is used.B. The command is used to establish a static route.C. The command is used to configure the router interfaces.D. The command is used to establish a stub network.E. The subnet mask for the source address is 255.255.255.0

在Pubmed检索中,查找林立发表的文献,检索表达式应该是()A、Lin-L in auB、Lin L [au]C、AU=Lin LD、Lin L=au

The VLANs in switch R1 are being modified. Which of the following are updated in R1 every time a VLAN is modified?()A、Configuration revision numberB、Configuration revision flag fieldC、Configuration revision reset switchD、Configuration revision databaseE、None of the other alternatives apply

Which of the following is an accurate description of the command copy startup-configftp://kevin:cisco@192.168.1.74?()A、The configuration on the FTP server is copied to RAMB、The command is not valid on a Cisco routerC、The configuration file in RAM is copied to an FTP serverD、The configuration file in NVRAM is copied to an FTP serverE、The configuration on the FTP server is copied to NVRAMF、The configuration will be copied from NVRAM to an FTP server with a filename of Kevin

Which three of the following protocols will be forwarded to a host specified by the ip helper - address interface configuration command if the configuration has not been modified by the ip forward - protocol udp global con figuration command?()A、BOOTPB、TFTPC、ARPD、DNSE、proxy - ARPF、FTP

An engineer is preparing an implementation plan in which the configuration needs to influence BGP's choice of best path. Which of the following is least likely to be used by the configuration in this imple mentation plan?()A、WeightB、Origin codeC、AS_PathD、Local_Pref

The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?()A、The default administrative distance is used.B、The command is used to establish a static route.C、The command is used to configure the router interfaces.D、The command is used to establish a stub network.E、The subnet mask for the source address is 255.255.255.0

Which of the following commands will restore a previously archived configuration by replacing therunning configuration with the archived configuration?()A、configure archive running-configB、configure replaceC、copy archive running configD、copy startup-config running-configE、copy tftp running-configF、configure tftp running-config

Which of the following specifies a set of consistent requirements for a workstation or server?()A、Vulnerability assessmentB、Imaging softwareC、Patch managementD、Configuration baseline

Which of the following is the minimum number of drives in an RAID 0 configuration?()A、 2B、 3C、 4D、 5

Which of the following should be changed to secure access to a WAPs configuration management interface?()A、SSIDB、WPA2C、DHCPD、Password

An administrator requires a summary of current configuration for each system. This is needed for an  audit trail.  Which of the following will provide this information()A、configassistB、prtconfC、IsattrD、listdgrp

单选题Which of the following BEST describes a benefit of RAID 0?()A High fault toleranceB Ease of failure recoveryC High performanceD No configuration

单选题Which of the following is an accurate description of the command copy startup-configftp://kevin:cisco@192.168.1.74?()AThe configuration on the FTP server is copied to RAMBThe command is not valid on a Cisco routerCThe configuration file in RAM is copied to an FTP serverDThe configuration file in NVRAM is copied to an FTP serverEThe configuration on the FTP server is copied to NVRAMFThe configuration will be copied from NVRAM to an FTP server with a filename of Kevin

多选题The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?()AThe default administrative distance is used.BThe command is used to establish a static route.CThe command is used to configure the router interfaces.DThe command is used to establish a stub network.EThe subnet mask for the source address is 255.255.255.0

单选题An administrator needs to update a router configuration for a router that does not support SSH.Which of the following can be used to securely update the router configuration?()AFTPBSNMPv2CTFTPDKTTPS

单选题Which of the following should an administrator do after running a command from the console onthe perimeter router?()AUpdate the configuration logsBUpdate the network wiring schematicsCUpdate the network configuration proceduresDCompare the configuration with the baseline

单选题Which of the following commands will restore a previously archived configuration by replacing therunning configuration with the archived configuration?()Aconfigure archive running-configBconfigure replaceCcopy archive running configDcopy startup-config running-configEcopy tftp running-configFconfigure tftp running-config

多选题On router R1, which three of the following protocols will be forwarded to a host specified by the "iphelper-address" interface configuration command if the configuration has not been modified by the"ip forward-protocol udp" global configuration command?()ABOOTPBTFTPCARPDDNSEproxy-ARPFFTPGCDP

单选题Which of the following statements regarding documentation would not be considered a helpful stepin the troubleshooting process?()AUse the Cisco Auto Configuration toolBUse the Cisco Rollback featureCAutomate documentationDSchedule documentation checksEUse the Cisco Configuration Archive toolFRequire documentation prior to a ticket being closed out

多选题Which three of the following protocols will be forwarded to a host specified by the ip helper - address interface configuration command if the configuration has not been modified by the ip forward - protocol udp global con figuration command?()ABOOTPBTFTPCARPDDNSEproxy - ARPFFTP

单选题In configuration mode you see the following prompt: [edit interfaces fe-1/1/1] user@router#  Which command will take you to operational mode?()AendBexitCquitDexit configuration-mode