On which options are standard access lists based?() A.destination address and wildcard maskB.source address and wildcard maskC.destination address and subnet maskD.source address and subnet mask

On which options are standard access lists based?()

A.destination address and wildcard mask

B.source address and wildcard mask

C.destination address and subnet mask

D.source address and subnet mask


相关考题:

Which of the following answer choices are correct characteristics of named access list?() A. You can delete individual statements in a named access listB. Named access lists require a numbered range from 1000 to 1099.C. Named access lists must be specified as standard or extended.D. You can use the ip access-list command to create named access lists.E. You cannot delete individual statements in a named access list.F. You can use the ip name-group command to apply named access lists.

On which options are standard access list based?() A. source address and subnet maskB. destination address and wildcard maskC. source address and wildcard maskD. destination address and subnet mask

Which command shows if an access list is assigned to an interface?() A. show ip interface [interface] access-listsB. show ip access-lists interface [interface]C. show ip interface [interface]D. show ip access-lists [interface]

Which statement about access lists that are applied to an interface is true?() A.you can apply multiple access lists with the same protocol or in different…B.you can config one access list,per direction,per layer 3 protocolC.you can placeasmanyaccess lists as you want on any interfaceD.you can apply ony one access list on any interface

Which of the following are characteristics of named access lists?()A、Individual statements in a named access list may be deleted.B、They require a numbered range from 1000 to 1099.C、When created, they must be specified as standard or extended.D、They are created with the ip access-list command.E、The entire access list must be deleted before editing.F、They are applied with the ip name-group command.

Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()A、Application of up to three access lists per protocol to a single interface.B、No more than two access lists per interface.C、One access list may be configured per direction for each Layer 3 protocol configured on an interface.D、The maximum number allowed varies due to RAM availability in the router.E、An infinite number of access lists that can be applied to an interface, from most specific to most general.F、Cisco IOS allows only one access list to an interface.

Which two statements apply to dynamic access lists?()A、they offer simpler management in large internetworks.B、you can control logging messages.C、they allow packets to be filtered based on upper-layer session information.D、you can set a time-based security policy.E、they provide a level of security against spoofing.F、they are used to authenticate individual users

Which of the following options are valid choices for cluster communication security?()A、rsh and sshB、Standard and VPNC、rhost and .shostsD、Classic and Enhanced

Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()A、Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.B、Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.C、Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.D、Clients connected to the rogue access point must be able to connect to the containment controller-based access point.

Which command shows if an access list is assigned to an interface?()A、show ip interface [interface] access-listsB、show ip access-lists interface [interface]C、show ip interface [interface]D、show ip access-lists [interface]

On which options are standard access list based?()A、source address and subnet maskB、destination address and wildcard maskC、source address and wildcard maskD、destination address and subnet mask

Which two statements about the Wi-Fi Multimedia (WMM) standard are true?()A、 Lower-priority traffic is assigned short interframe wait-timers to allow higher-priority traffic access to the wireless network first.B、 Packets that are not assigned to a specific access category are categorized by default as the background access category.C、 The WMM standard was implemented after the 802.11e standard was approved to provide support for non 802.11e devices.D、 WMM is a Wi-Fi Alliance standard that was implemented before the 802.11e standard was approved.E、 WMM uses Enhanced DCF (EDCF) to stipulate fixed and random wait times for the different access classes.

On which options are standard access lists based?()A、destination address and wildcard maskB、source address and wildcard maskC、destination address and subnet maskD、source address and subnet mask

Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different…B、you can config one access list,per direction,per layer 3 protocolC、you can place as many access lists as you want on any interfaceD、you can apply ony one access list on any interface

You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()A、Use Windows directory service mapper and enable Microsoft .NET Passport authenticationB、Create authorization rules and scopes by using Authorization ManagerC、Use one-to-many client certificate mappingD、Define permissions by using access control lists (ACLs)

多选题Which two components are unique to controller-based wireless installations? ()AMobility Services EngineBWLAN controllerCCisco Wireless Control SystemDrugged/exterior access pointsEinterior access points

多选题Which of the following are characteristics of named access lists?()AIndividual statements in a named access list may be deleted.BThey require a numbered range from 1000 to 1099.CWhen created, they must be specified as standard or extended.DThey are created with the ip access-list command.EThe entire access list must be deleted before editing.FThey are applied with the ip name-group command.

单选题Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()AApplication of up to three access lists per protocol to a single interface.BNo more than two access lists per interface.COne access list may be configured per direction for each Layer 3 protocol configured on an interface.DThe maximum number allowed varies due to RAM availability in the router.EAn infinite number of access lists that can be applied to an interface, from most specific to most general.FCisco IOS allows only one access list to an interface.

多选题Which two statements about queuing mechanisms are true? ()AFIFO queuing is only appropriate for slower serial interfacesBweighted fair queuing is the default queuing mechanism used for all but slower than E1 rate interfacesConly one queuing mechanism type can be applied to an interfaceDweighted fair queuing does not require the configuration of access lists to classify trafficEflow-based weighted fair queuing provides for queues to be serviced in a round-robin fashion

多选题Which two statements apply to dynamic access lists?()Athey offer simpler management in large internetworks.Byou can control logging messages.Cthey allow packets to be filtered based on upper-layer session information.Dyou can set a time-based security policy.Ethey provide a level of security against spoofing.Fthey are used to authenticate individual users

多选题Which two statements apply to dynamic access lists?()Athey offer simpler management in large internetworks.Byou can control logging messages.Cthey allow packets to be filtered based on upper-layer session information.Dyou can set a time-based security policy.Ethey provide a level of security against spoofing.Fthey are used to authenticate individual users.

单选题Which statement about access lists that are applied to an interface is true?()Ayou can apply multiple access lists with the same protocol or in different…Byou can config one access list,per direction,per layer 3 protocolCyou can placeasmanyaccess lists as you want on any interfaceDyou can apply ony one access list on any interface

单选题__________assessment is based on a fixed standard that is usually the ultimate goal which the students are expected to achieve at the end of the course.ACriterion-referencedBNorm-referencedCSummativeDDiagnostic

单选题Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()Aclients connected to the rogue access point must be able to connect to the containment controller-based access point.Bmultiple controller-based access points will load-balance the containment task using fewer resources than a single access point.Cclients connected to the rogue access point may be out of the range of the controller-based access point providing containment.Deach controller-based access point can handle only a limited amount of clients connected to the rogue access points.

单选题Which statement about access lists that are applied to an interface is true?()Ayou can apply multiple access lists with the same protocol or in different direction.Byou can config one access list,per direction,per layer 3 protocolCyou can place as many access lists as you want on any interfaceDyou can apply only one access list on any interface

多选题Which of the following answer choices are correct characteristics of named access list?()AYou can delete individual statements in a named access listBNamed access lists require a numbered range from 1000 to 1099.CNamed access lists must be specified as standard or extended.DYou can use the ip access-list command to create named access lists.EYou cannot delete individual statements in a named access list.FYou can use the ip name-group command to apply named access lists.