单选题How will the above access lists affect traffic?()AFTP traffic from 192.169.1.22 will be deniedBNo traffic, except for FTP traffic will be allowed to exit E0CFTP traffic from 192.169.1.9 to any host will be deniedDAll traffic exiting E0 will be deniedEAll FTP traffic to network 192.169.1.9/29 will be denied

单选题
How will the above access lists affect traffic?()
A

FTP traffic from 192.169.1.22 will be denied

B

No traffic, except for FTP traffic will be allowed to exit E0

C

FTP traffic from 192.169.1.9 to any host will be denied

D

All traffic exiting E0 will be denied

E

All FTP traffic to network 192.169.1.9/29 will be denied


参考解析

解析: 暂无解析

相关考题:

The relevant portion of the Barrymore router configuration is displayed below:In your effort to conserve precious bandwidth, you set up some ACL‘s to deny internet access to the remote server located at 192.168.20.5. A few minutes after reconfiguring (as shown in the exhibit above) you notice that some web traffic is still going through.Based on the above output, what do you suspect as to why the traffic still traveling over the ISDN link?()A. Broadcasts are creating interesting traffic.B. The access-list is not configured correctly.C. The command ip access-group 129 out is missing from the bri0/0 interface.D. The dialer-group has not been applied to outbound traffic.

The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN:How will the above access lists affect traffic?() A. FTP traffic from 192.169.1.22 will be denied.B. No traffic, except for FTP traffic will be allowed to exit E0.C. FTP traffic from 192.169.1.9 to any host will be denied.D. All traffic exiting E0 will be denied.E. All FTP traffic to network 192.169.1.9/29 will be denied.

How will the above access lists affect traffic?() A.FTP traffic from 192.169.1.22 will be deniedB.No traffic, except for FTP traffic will be allowed to exit E0C.FTP traffic from 192.169.1.9 to any host will be deniedD.All traffic exiting E0 will be deniedE.All FTP traffic to network 192.169.1.9/29 will be denied

Th efollowing access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29LAN:access-list 135 deny tcp 192.169.1.80.0.0.7 eq 20 anyaccess-list 135 deny tcp 192.169.1.80.0.0.7 e q21 anyHow will the above access lists affect traffic?()A.FTP traffic from 192.169.1.22 wil lbe deniedB.Not raffic,except for FTP traffic wil lbe allowed to exit E0C.FTP traffic from 192.169.1.9 to any host will be deniedD.All traffic exiting E0 will be deniedE.All FTP traffic to network 192.169.1.9/29 will be denied

What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions

What are two step needed to define a QoS policy for a traffic class?()A、determine a minimum bandwidth guaranteeB、determine interfaces to which to apply policyC、assign priorities to the classD、configure access control lists

An administrator analyzes a poorly performing system and suspects that the issue is related to CPU resource. Upon reviewing output of vmstat, the administrator is concerned with the values in the ‘pc’ and ‘ec’ columns. Which definition describes these two headings?()A、'pc' refers to the number of physical processors consumed, while 'ec' refers to the percentage of entitled capacity consumed.B、'pc' refers to the 'physical CPUs' and lists how many are left un-allocated, while ec' refers to the 'entitled CPUs' and lists what amount is currently allocated to the LPAR.C、'pc' refers to the 'processor count' and reflects how many CPUs are allocated to the LPAR, while 'ec ' refers to the 'extra capacity' and lists how much above the LPAR entitlement is being consumed.D、'pc' refers to 'processor cards' and reflects how many MCM modules are actually being used by this LPAR, while 'ec' refers to the 'entitled CPUs'and lists what amount is currently allocated to the LPAR.

Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()A、 The data traffic between the access point and controller is not encrypted.B、 The data traffic is encapsulated with LWAPP.C、 The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.D、 The data traffic is encrypted with AES.E、 All of the above

Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the path cost calculated?()A、number of hopsB、priority of the bridgeC、interface bandwidthD、interface delayE、None of the above

What are two steps needed to define a QoS policy for a traffic class?()A、 Determine a minimum bandwidth guarantee.B、 Determine interfaces to which to apply policy.C、 Assign priorities to the class.D、 Configure access control lists.

Which of the following are benefits provided with access control lists (ACLs)?()A、ACLs monitor the number of bytes and packets.B、Virus detection.C、ACLs dentify interesting traffic for DDR.D、ACLs provide IP route filtering.E、ACLs provide high network availability.F、ACLs classify and organize network traffic.

How will the above access lists affect traffic?()A、FTP traffic from 192.169.1.22 will be deniedB、No traffic, except for FTP traffic will be allowed to exit E0C、FTP traffic from 192.169.1.9 to any host will be deniedD、All traffic exiting E0 will be deniedE、All FTP traffic to network 192.169.1.9/29 will be denied

What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router  B、to control broadcast traffic through a router  C、to filter traffic as it passes through a router  D、to filter traffic that originates from the router  E、to replace passwords as a line of defense against security incursions

How does a controller-based access point configured to operate in sniffer mode behave?()A、allows client traffic, captures data on all channelsB、allows client traffic, captures data on a single channelC、allows no client traffic, captures data on all channelsD、allows no client traffic, captures data on a single channel

When implementing 802.1X on Teleworker routers and using separate DHCP address pools for Teleworker and Home-user devices, traffic between devices can be restricted. How can you best accomplish this?()A、Access Lists between the inside interface and loopback interfaceB、Context Based Access ControlC、Dynamic Host Configuration ProtocolD、Network Address translation

Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different…B、you can config one access list,per direction,per layer 3 protocolC、you can place as many access lists as you want on any interfaceD、you can apply ony one access list on any interface

Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A、the log option for the particular SCREEN optionB、the permit option for the particular SCREEN optionC、the SCREEN option, because it does not drop traffic by defaultD、the alarm-without-drop option for the particular SCREEN option

单选题On your newly installed router, you apply the access list illustrated below to interface Ethernet 0 on a Cisco router. The interface is connected to the 192.168.1.8/29 LAN. access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 20 any access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 21 any How will the above access lists affect traffic?()AAll traffic will be allowed to exit E0 except FTP traffic.BFTP traffic from 192.168.166.19 to any host will be denied.CFTP traffic from 192.168.166.22 to any host will be denied.DAll traffic exiting E0 will be denied.EAll FTP traffic to network 192.168.166.18/29 from any host will be denied.

单选题The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN: access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 21 any How will the above access lists affect traffic? ()AFTP traffic from 192.169.1.22 will be deniedBNo traffic, except for FTP traffic will be allowed to exit E0CFTP traffic from 192.169.1.9 to any host will be deniedDAll traffic exiting E0 will be deniedEAll FTP traffic to network 192.169.1.9/29 will be denied

多选题Which of the following are benefits provided with access control lists (ACLs)?()AACLs monitor the number of bytes and packets.BVirus detection.CACLs dentify interesting traffic for DDR.DACLs provide IP route filtering.EACLs provide high network availability.FACLs classify and organize network traffic.

单选题When implementing 802.1X on Teleworker routers and using separate DHCP address pools for Teleworker and Home-user devices, traffic between devices can be restricted. How can you best accomplish this?()AAccess Lists between the inside interface and loopback interfaceBContext Based Access ControlCDynamic Host Configuration ProtocolDNetwork Address translation

单选题Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the path cost calculated?()Anumber of hopsBpriority of the bridgeCinterface bandwidthDinterface delayENone of the above

单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()Athe log option for the particular SCREEN optionBthe permit option for the particular SCREEN optionCthe SCREEN option, because it does not drop traffic by defaultDthe alarm-without-drop option for the particular SCREEN option

多选题What are some general guidelines regarding the placement of access control lists?()AYou should place standard ACLS as close as possible to the source of traffic to be denied.BYou should place extended ACLS as close as possible to the source of traffic to be denied.CYou should place standard ACLS as close as possible to the destination of traffic to be denied.DYou should place extended ACLS should be places as close as possible to the destination of traffic to be denied.

多选题Which of the following answer choices are correct characteristics of named access list?()AYou can delete individual statements in a named access listBNamed access lists require a numbered range from 1000 to 1099.CNamed access lists must be specified as standard or extended.DYou can use the ip access-list command to create named access lists.EYou cannot delete individual statements in a named access list.FYou can use the ip name-group command to apply named access lists.

单选题An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()AConfigure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.BConfigure pNAT to ensure Voice over IP packets are properly translated.CConfigure IOS firewall to permit RTP port numbers through the firewall via VPN. DConfigure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.

单选题Th efollowing access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29LAN: access-list 135 deny tcp 192.169.1.80.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.80.0.0.7 e q21 any How will the above access lists affect traffic?()AFTP traffic from 192.169.1.22 wil lbe deniedBNot raffic,except for FTP traffic wil lbe allowed to exit E0CFTP traffic from 192.169.1.9 to any host will be deniedDAll traffic exiting E0 will be deniedEAll FTP traffic to network 192.169.1.9/29 will be denied

单选题Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()A The data traffic between the access point and controller is not encrypted.B The data traffic is encapsulated with LWAPP.C The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.D The data traffic is encrypted with AES.E All of the above