Which of the following are benefits provided with access control lists (ACLs)?() A. ACLs monitor the number of bytes and packets.B. Virus detection.C. ACLs dentify interesting traffic for DDR.D. ACLs provide IP route filtering.E. ACLs provide high network availability.F. ACLs classify and organize network traffic.
Which of the following are benefits provided with access control lists (ACLs)?()
A. ACLs monitor the number of bytes and packets.
B. Virus detection.
C. ACLs dentify interesting traffic for DDR.
D. ACLs provide IP route filtering.
E. ACLs provide high network availability.
F. ACLs classify and organize network traffic.
相关考题:
Which of the following objects contains control structures that are considered the bound form of SQL statements?() A.UDTB.TriggerC.PackageD.Access plan
You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command ip access-group 101 in to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()A. Telnet sessions from host A to host 5.1.1.10B. Telnet sessions from host A to host 5.1.3.10C. Telnet sessions from host B to host 5.1.2.10D. Telnet sessions from host B to host 5.1.3.8E. Telnet sessions from host C to host 5.1.3.10F. Telnet sessions from host F to host 5.1.1.10
Which of the following answer choices are correct characteristics of named access list?() A. You can delete individual statements in a named access listB. Named access lists require a numbered range from 1000 to 1099.C. Named access lists must be specified as standard or extended.D. You can use the ip access-list command to create named access lists.E. You cannot delete individual statements in a named access list.F. You can use the ip name-group command to apply named access lists.
Scalability is provided in the server farm module by which of the following design strategies?() A. up to 10Gbps of bandwidth at the access levelB. redundant servers at the access levelC. modular block design at the access levelD. high port densities at the access level
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。 A.IPB.ICMPC.TCPD.UDP
Which of the following objects contains control structures that are considered the bound form of SQL statements?()A、UDTB、TriggerC、PackageD、Access plan
Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()A、Application of up to three access lists per protocol to a single interface.B、No more than two access lists per interface.C、One access list may be configured per direction for each Layer 3 protocol configured on an interface.D、The maximum number allowed varies due to RAM availability in the router.E、An infinite number of access lists that can be applied to an interface, from most specific to most general.F、Cisco IOS allows only one access list to an interface.
Which three of the following basic network services are provided by the Cisco IOS?()A、Defines the network topologyB、Access to network resourcesC、Routing and switching functionsD、Content FilteringE、Intrusion Detection
A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()A、are optionalB、are used to protect data beansC、provide coarse-grained access controlD、never specify a relationship
Which of the following is NOT provided by AVC?()A、 Safe SearchB、 Web usage quotasC、 Deep IM controlD、 Media bandwidth control
Which of the following are benefits provided with access control lists (ACLs)?()A、ACLs monitor the number of bytes and packets.B、Virus detection.C、ACLs dentify interesting traffic for DDR.D、ACLs provide IP route filtering.E、ACLs provide high network availability.F、ACLs classify and organize network traffic.
Scalability is provided in the server farm module by which of the following design strategies?()A、 up to 10 Gbps of bandwidth at the access levelB、 redundant servers at the access levelC、 modular block design at the access levelD、 high port densities at the access level
Scalability is provided in the server farm module by which of the following design strategies?()A、up to 10Gbps of bandwidth at the access levelB、redundant servers at the access levelC、modular block design at the access levelD、high port densities at the access level
Which of the following scenarios would dictate the use of a 64-bit processor instead of a 32-bit processor?()A、Implementation of access control lists (ACLs)B、Implementation of more than two network cardsC、Implementation of iSCSI attached storageD、Implementation of more than 4GB of RAM
Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()A、/var/rmc/ctrmc.aclsB、/etc/ctrmc/rsct.aclsC、/etc/security/rsct.aclsD、/usr/sbin/rsct/cfg/ctrmc.acls
You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1
You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()A、Use Windows directory service mapper and enable Microsoft .NET Passport authenticationB、Create authorization rules and scopes by using Authorization ManagerC、Use one-to-many client certificate mappingD、Define permissions by using access control lists (ACLs)
单选题Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()AApplication of up to three access lists per protocol to a single interface.BNo more than two access lists per interface.COne access list may be configured per direction for each Layer 3 protocol configured on an interface.DThe maximum number allowed varies due to RAM availability in the router.EAn infinite number of access lists that can be applied to an interface, from most specific to most general.FCisco IOS allows only one access list to an interface.
多选题As the Company wireless administrator, you required to be knowledgeable about the wireless LAN components. Which two statements about these components are true? ()AIn the autonomous access point solution, control is provided by the WLAN controller.BIn the lightweight access point solution, WLAN management is provided by the WLAN Control System (WCS).CIn the autonomous access point solution, control is provided by the WDS (Wireless Domain Services).DCisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless Network.EIi the lightweight access point solution, WLAN management is provided by the WLAN Solution Engine (WLSE).FCisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless Network.
单选题Which of the following is NOT provided by AVC?()A Safe SearchB Web usage quotasC Deep IM controlD Media bandwidth control
多选题Which of the following are benefits provided with access control lists (ACLs)?()AACLs monitor the number of bytes and packets.BVirus detection.CACLs dentify interesting traffic for DDR.DACLs provide IP route filtering.EACLs provide high network availability.FACLs classify and organize network traffic.
单选题Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()A/var/rmc/ctrmc.aclsB/etc/ctrmc/rsct.aclsC/etc/security/rsct.aclsD/usr/sbin/rsct/cfg/ctrmc.acls
多选题A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-grained access controlDnever specify a relationship
多选题Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL(Racl) is correct?()ACoPP protects against IP spoofing;Racl protects against DoS attacks.BCoPP can not use named access lists;Racl can use named access listsCCoPP applies to a dedicated control plane interface;Racl applies to all interfaces.DCoPP needs a AAA server,Racl does not need a AAA serverECoPP supports rate limits;Racl does not support rate limits
多选题What are some general guidelines regarding the placement of access control lists?()AYou should place standard ACLS as close as possible to the source of traffic to be denied.BYou should place extended ACLS as close as possible to the source of traffic to be denied.CYou should place standard ACLS as close as possible to the destination of traffic to be denied.DYou should place extended ACLS should be places as close as possible to the destination of traffic to be denied.
单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()AIPBICMPCTCPDUDP
单选题Scalability is provided in the server farm module by which of the following design strategies?()A up to 10 Gbps of bandwidth at the access levelB redundant servers at the access levelC modular block design at the access levelD high port densities at the access level
多选题Which of the following answer choices are correct characteristics of named access list?()AYou can delete individual statements in a named access listBNamed access lists require a numbered range from 1000 to 1099.CNamed access lists must be specified as standard or extended.DYou can use the ip access-list command to create named access lists.EYou cannot delete individual statements in a named access list.FYou can use the ip name-group command to apply named access lists.