单选题Which of the following commands would successfully implement an access list on a routers virtual terminal line?()ARouterTK(config-line)# access-class 10 inBRouterTK(config-if)# ip access-class 23 outCRouterTK(config-line)# access-list 150 inDRouterTK(config-if)# ip access-list 128 outERouterTK(config-line)# access-group 15 outFRouterTK(config-if)# ip access-group 110 in

单选题
Which of the following commands would successfully implement an access list on a routers virtual terminal line?()
A

RouterTK(config-line)# access-class 10 in

B

RouterTK(config-if)# ip access-class 23 out

C

RouterTK(config-line)# access-list 150 in

D

RouterTK(config-if)# ip access-list 128 out

E

RouterTK(config-line)# access-group 15 out

F

RouterTK(config-if)# ip access-group 110 in


参考解析

解析: 暂无解析

相关考题:

Which of the following commands would successfully implement an access list on a routers virtual terminal line?() A. RouterTK(config-line)# access-class 10 inB. RouterTK(config-if)# ip access-class 23 outC. RouterTK(config-line)# access-list 150 inD. RouterTK(config-if)# ip access-list 128 outE. RouterTK(config-line)# access-group 15 outF. RouterTK(config-if)# ip access-group 110 in

Which of the following commands would successfully implement an access list on a routers virtual terminal line?()A、RouterTK(config-line)# access-class 10 inB、RouterTK(config-if)# ip access-class 23 outC、RouterTK(config-line)# access-list 150 inD、RouterTK(config-if)# ip access-list 128 outE、RouterTK(config-line)# access-group 15 outF、RouterTK(config-if)# ip access-group 110 in

Which of these phase comprises post-project support activities: activities that happen after a project is successfully implemented and handed off? Select exactly 1 answer(s) from the following:()。A、planB、prepareC、operateD、implement

Which of the following commands would a technician MOST likely use to map a printer from aremote computer?()A、NET USEB、IPCONFIGC、NSLOOKUPD、TRACERT

Which of the following commands would be used to verify the integrity of critical system files?()A、verifyB、nslookupC、sfcD、chkdsk

Which of the following commands would be used to display the IP address on a UNIX/Linux computer?()A、netstatB、ipconfigC、ifconfigD、dig

Which of the following would a company implement to help reduce the cost of electricity?()A、Shutdown/power policiesB、Redundant power suppliesC、Use optical miceD、Social engineering policy

Which of the following is MOST likely the reason a technician would implement software RAID for a SOHO environment?()A、CPU efficiencyB、High availabilityC、High redundancyD、Cost effective

Which of the following commands would be used to verify and troubleshoot DNS settings of aparticular host on a Windows computer?()A、TRACERTB、NSLOOKUPC、CHKDSKD、XCOPY

Which of the following commands would be used to display hidden files?()A、dir /?B、dir /dC、dir /aD、dir /s

Following a system boot,the display indicates that previously detected hardware is missing.  Which of the following commands would identify the missing hardware?()A、diagB、lscfgC、cfgmgrD、lsslot

A system administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this?()A、usrckB、sysckC、lssecD、lsuser

A System p administrator would like to verify the user definitions in the /etc/passwd file.  Which of the following commands will accomplish this()A、sysckB、usrckC、lssecD、lsuser