What are some general guidelines regarding the placement of access control lists?() A. You should place standard ACLS as close as possible to the source of traffic to be denied.B. You should place extended ACLS as close as possible to the source of traffic to be denied.C. You should place standard ACLS as close as possible to the destination of traffic to be denied.D. You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.

What are some general guidelines regarding the placement of access control lists?()

A. You should place standard ACLS as close as possible to the source of traffic to be denied.

B. You should place extended ACLS as close as possible to the source of traffic to be denied.

C. You should place standard ACLS as close as possible to the destination of traffic to be denied.

D. You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.


相关考题:

Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.) A. protocol listB. MIMEC. block listD. extension

Which command is used to display the placement and direction of an IP access control list on a router?() A. show access-listB. show ip routeC. show ip interfaceD. show interfaceE. show interface listF. show ip interface brief

You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A. show access-listB. show ip access-listC. show ip interfaceD. show interfaceE. show interface list

For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。 A.IPB.ICMPC.TCPD.UDP

You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A、show access-listB、show ip access-listC、show ip interfaceD、show interfaceE、show interface list

What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions

Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()A、Application of up to three access lists per protocol to a single interface.B、No more than two access lists per interface.C、One access list may be configured per direction for each Layer 3 protocol configured on an interface.D、The maximum number allowed varies due to RAM availability in the router.E、An infinite number of access lists that can be applied to an interface, from most specific to most general.F、Cisco IOS allows only one access list to an interface.

What are two step needed to define a QoS policy for a traffic class?()A、determine a minimum bandwidth guaranteeB、determine interfaces to which to apply policyC、assign priorities to the classD、configure access control lists

Which of these is true regarding the configuration and application of port access control lists? ()A、PACLs can be applied in the inbound or outbound direction of a Layer 2 physical interface. B、At Layer 2, a MAC address PACL will take precedence over any existing Layer 3 PACL.C、When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port.D、PACLs are not supported on EtherChannel interfaces.

Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()A、show interface listB、show ip routeC、show ip interfaceD、show ip interface briefE、show interface

What are two steps needed to define a QoS policy for a traffic class?()A、 Determine a minimum bandwidth guarantee.B、 Determine interfaces to which to apply policy.C、 Assign priorities to the class.D、 Configure access control lists.

Which command is used to display the placement and direction of an IP access control list on a router?()A、show access-listB、show ip routeC、show ip interfaceD、show interfaceE、show interface listF、show ip interface brief

What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router  B、to control broadcast traffic through a router  C、to filter traffic as it passes through a router  D、to filter traffic that originates from the router  E、to replace passwords as a line of defense against security incursions

What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()A、The best match of the ACL entries will be used for granularity of control.B、They use source IP information for matching operations.C、They use source and destination IP information for matching operations.D、They use source IP information along with protocol-type information for finer granularity of control.

In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()A、to specify the destination addresses to which access is permittedB、to specify the source address permitted to access the resourceC、to specify the services to which access is permittedD、to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1

You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()A、Use Windows directory service mapper and enable Microsoft .NET Passport authenticationB、Create authorization rules and scopes by using Authorization ManagerC、Use one-to-many client certificate mappingD、Define permissions by using access control lists (ACLs)

单选题Which command is used to display the placement and direction of an IP access control list on a router?()Ashow access-listBshow ip routeCshow ip interfaceDshow interfaceEshow interface listFshow ip interface brief

多选题Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)Aprotocol listBMIMECblock listDextension

单选题Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()Ashow interface listBshow ip routeCshow ip interfaceDshow ip interface briefEshow interface

单选题Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()AApplication of up to three access lists per protocol to a single interface.BNo more than two access lists per interface.COne access list may be configured per direction for each Layer 3 protocol configured on an interface.DThe maximum number allowed varies due to RAM availability in the router.EAn infinite number of access lists that can be applied to an interface, from most specific to most general.FCisco IOS allows only one access list to an interface.

单选题What does a Cisco Unified Wireless IP Phone 7921G deployment require()?Amore access points than a data networkBfewer access points than a data networkCless SNR than a data networkDspecific relative access point placement

多选题What are some general guidelines regarding the placement of access control lists?()AYou should place standard ACLS as close as possible to the source of traffic to be denied.BYou should place extended ACLS as close as possible to the source of traffic to be denied.CYou should place standard ACLS as close as possible to the destination of traffic to be denied.DYou should place extended ACLS should be places as close as possible to the destination of traffic to be denied.

单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()AIPBICMPCTCPDUDP

单选题You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()Ashow access-listBshow ip access-listCshow ip interfaceDshow interfaceEshow interface list

单选题What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()AThe best match of the ACL entries will be used for granularity of control.BThey use source IP information for matching operations.CThey use source and destination IP information for matching operations.DThey use source IP information along with protocol-type information for finer granularity of control.

单选题An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()AConfigure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.BConfigure pNAT to ensure Voice over IP packets are properly translated.CConfigure IOS firewall to permit RTP port numbers through the firewall via VPN. DConfigure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.

单选题Some cable services offer 1.5 megabyte or higher access for as ______ as $40 a month, but there are some restrictions regarding service.AlittleBshortCscarceDrare