Which one of the access control list statements below will deny all telnet connections to subnet 10.10.1.0/24?()A、access-list 15 deny telnet any 10.10.1.0 0.0.0.255 eq 23B、access-list 115 deny udp any 10.10.1.0 eq telnetC、access-list 15 deny tcp 10.10.1.0 255.255.255.0 eq telnetD、access-list 115 deny tcp any 10.10.1.0 0.0.0.255 eq 23E、access-list 15 deny udp any 10.10.1.0 255.255.255.0 eq 23

Which one of the access control list statements below will deny all telnet connections to subnet 10.10.1.0/24?()

  • A、access-list 15 deny telnet any 10.10.1.0 0.0.0.255 eq 23
  • B、access-list 115 deny udp any 10.10.1.0 eq telnet
  • C、access-list 15 deny tcp 10.10.1.0 255.255.255.0 eq telnet
  • D、access-list 115 deny tcp any 10.10.1.0 0.0.0.255 eq 23
  • E、access-list 15 deny udp any 10.10.1.0 255.255.255.0 eq 23

相关考题:

_______control system is one in which the control action is independent of the output.A.Feed backB.Negative feed backC.Close loopD.Open loop

Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?() A. Odyssey Access ClientB. Junos PulseC. Java agentD. Agent less access

Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()A. Session-Export policies on the Junos Pulse Secure Access ServiceB. Session-Export policies on the Junos Pulse Access Control ServiceC. Session-Import policies on the Junos Pulse Secure Access ServiceD. Session-Import policies on the Junos Pulse Access Control ServiceE. Resource access policies on the Junos Pulse Access Control Service

You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()A. show services unified-access-control authentication-tableB. show auth tableC. show services unified-access-control policiesD. show services unified-access-control captive-portal

Which switching engine enables the access control list lookup to be committed to hardware? () A.IETFB.PFCC.ASICD.TCAM

Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?() A. show interface listB. show ip routeC. show ip interfaceD. show ip interface briefE. show interface

You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?() A. permit access-list 101 outB. ip access-group 101 outC. apply access-list 101 outD. access-class 101 outE. ip access-list e0 out

Which one of the access control list statements below will deny all telnet connections to subnet 10.10.1.0/24?() A. access-list 15 deny telnet any 10.10.1.0 0.0.0.255 eq 23B. access-list 115 deny udp any 10.10.1.0 eq telnetC. access-list 15 deny tcp 10.10.1.0 255.255.255.0 eq telnetD. access-list 115 deny tcp any 10.10.1.0 0.0.0.255 eq 23E. access-list 15 deny udp any 10.10.1.0 255.255.255.0 eq 23

Which one of the following is NOT a valid RADIUS packet type?()A、 Access-rejectB、 Access-responseC、 Access-challengeD、 Access-replyE、 Access-accept

You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A、permit access-list 101 outB、ip access-group 101 outC、apply access-list 101 outD、access-class 101 outE、ip access-list e0 out

A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()A、are optionalB、are used to protect data beansC、provide coarse-grained access controlD、never specify a relationship

Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()A、show interface listB、show ip routeC、show ip interfaceD、show ip interface briefE、show interface

Which switching engine enables the access control list lookup to be committed to hardware? ()A、IETFB、PFCC、ASICD、TCAM

A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()A、are mandatoryB、specify action group ExecuteCommandActionGroup for Controller commandsC、specify action group ViewCommandActionGroup for View commandsD、specify resource group ControllerCommandResourceGroup for Controller commandsE、specify resource group ViewCommandResourceGroup for View commands

In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()A、to specify the destination addresses to which access is permittedB、to specify the source address permitted to access the resourceC、to specify the services to which access is permittedD、to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

单选题Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()Ashow interface listBshow ip routeCshow ip interfaceDshow ip interface briefEshow interface

单选题ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()A It is a list of remote database links stored in the XML file that are available to the users of the database.B It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

多选题Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()ASession-Export policies on the Junos Pulse Secure Access ServiceBSession-Export policies on the Junos Pulse Access Control ServiceCSession-Import policies on the Junos Pulse Secure Access ServiceDSession-Import policies on the Junos Pulse Access Control ServiceEResource access policies on the Junos Pulse Access Control Service

多选题A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-grained access controlDnever specify a relationship

多选题What are two use cases enabled by IF-MAP Federation?()AUsers authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.BUsers authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.CRemote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.DRemote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.

单选题You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()Ashow services unified-access-control authentication-tableBshow auth tableCshow services unified-access-control policiesDshow services unified-access-control captive-portal

单选题In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()Ato specify the destination addresses to which access is permittedBto specify the source address permitted to access the resourceCto specify the services to which access is permittedDto inform the enforcer to expect policy information from the Junos Pulse Access Control Service

单选题You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()Ashow access-listBshow ip access-listCshow ip interfaceDshow interfaceEshow interface list

单选题Which one of the following is NOT a valid RADIUS packet type?()A Access-rejectB Access-responseC Access-challengeD Access-replyE Access-accept

单选题Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()AOdyssey Access ClientBJunos PulseCJava agentDAgent less access

单选题() control system is one in which the control action is independent of the output.AFeed backBNegative feed backCClose loopDOpen loop

单选题You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()Apermit access-list 101 outBip access-group 101 outCapply access-list 101 outDaccess-class 101 outEip access-list e0 out