What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。 A.protocolB.VLAN numberC.TCP or UDP port numbersD.source switch port numberE.source IP address and destination IP addressF.source MAC address and destination MAC address

What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

A.protocol

B.VLAN number

C.TCP or UDP port numbers

D.source switch port number

E.source IP address and destination IP address

F.source MAC address and destination MAC address


相关考题:

Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.) A. routing-instanceB. zoneC. interfaceD. policyE. rule-set

Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.) A. access profileB. client groupC. clientD. default profileE. external

What are three characteristics of a service tunnel? ()(Choose three.) A. It is bidirectional.B. It carries optimized traffic.C. It can carry traffic using UDP.D. It is formed only within a community

Which three statistics does the Executive report summarize?() (Choose three.) A. latency and lossB. compression resultsC. traffic (by application)D. CRC and alignment errorsE. user access (by username)

What are the three main parts of a syslog message? ()(Choose three.)A、severity levelB、facilityC、log message nameD、time stampE、error codesF、access privilege

An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。A、FTPB、TelnetC、SMTPD、DNSE、HTTPF、POP3

What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions

What are three pieces of information that the Cisco IOS show inventory command displays on a Cisco ISR Router? ()(Choose three.)A、Installed Hardware serial numbersB、The status of installed hardwareC、Installed hardwareD、Unique Device IdentifierE、system internal temperatureF、main power supply condition

Which three statistics does the Executive report summarize?() (Choose three.)A、latency and lossB、compression resultsC、traffic (by application)D、CRC and alignment errorsE、user access (by username)

What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A、protocolB、VLAN numberC、TCP or UDP port numbersD、source switch port numberE、source IP address and destination IP addressF、source MAC address and destination MAC address

What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router  B、to control broadcast traffic through a router  C、to filter traffic as it passes through a router  D、to filter traffic that originates from the router  E、to replace passwords as a line of defense against security incursions

An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()A、FTPB、TelnetC、SMTPD、DNSE、HTTPF、POP3

What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects

Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)A、routing-instanceB、zoneC、interfaceD、policyE、rule-set

What are three characteristics of a service tunnel? ()(Choose three.)A、It is bidirectional.B、It carries optimized traffic.C、It can carry traffic using UDP.D、It is formed only within a community

Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)A、access profileB、client groupC、clientD、default profileE、external

What are three WAN reports that can be generated with the WX device?() (Choose three.)A、throughputB、performanceC、pass-throughD、application summaryE、packet size distribution

多选题What are three pieces of information that the Cisco IOS show inventory command displays on a Cisco ISR Router? ()(Choose three.)AInstalled Hardware serial numbersBThe status of installed hardwareCInstalled hardwareDUnique Device IdentifierEsystem internal temperatureFmain power supply condition

多选题What are three characteristics of a service tunnel? ()(Choose three.)AIt is bidirectional.BIt carries optimized traffic.CIt can carry traffic using UDP.DIt is formed only within a community

多选题What are three WAN reports that can be generated with the WX device?() (Choose three.)AthroughputBperformanceCpass-throughDapplication summaryEpacket size distribution

多选题What are three ways an IP interface can be assigned to a virtual router in a PPP over ATM environment? ()(Choose three.)AprofileBpolicy listCdomain mapDRADIUS VSAEclassifier ACL

多选题An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()AFTPBTelnetCSMTPDDNSEHTTPFPOP3

多选题Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)Arouting-instanceBzoneCinterfaceDpolicyErule-set

多选题An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。AFTPBTelnetCSMTPDDNSEHTTPFPOP3

多选题Which three of these items are found within the router advertisement message of IPv6 stateless autoconfiguration?() (Choose three.)Aflags indicating the kind of autoconfiguration that can be done by hostsBdefault router informationC/64 prefix that can be used on the link and the lifetime of the prefixDIPv6 DHCP server address information

多选题What are three configuration objects used to build Junos IDP rules? ()(Choose three.)Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects

多选题What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。AprotocolBVLAN numberCTCP or UDP port numbersDsource switch port numberEsource IP address and destination IP addressFsource MAC address and destination MAC address