单选题In which solution is a router ACL used?()Aprotecting a server frome unauthorized accesBcontrolling path selection,based on the route metricCreducing router CPU utilizationDfilterring packets that are passing through a router

单选题
In which solution is a router ACL used?()
A

protecting a server frome unauthorized acces

B

controlling path selection,based on the route metric

C

reducing router CPU utilization

D

filterring packets that are passing through a router


参考解析

解析: 暂无解析

相关考题:

Which command is used on the local router to invoke a loopback mode on a remote ERX Edge Router?() A.AB.BC.CD.D

Which protocol is used to transfer files to on the ERX Edge Router?() A.SCPB.FTPC.RCPD.TFTP

Which of the following protocols would be used in order to log into a router to configure a VLAN?() A.RDPB.SMTPC.TELNETD.FTP

What is the purpose of the OSPF router ID in a OR/BOR election?() A. It is used with the OSPF priority values to determine which OSPF router will become the DR or BOR in a point-to-point networkB. It is used with the OSPF priority values to determine which interface will be used to form a neighbor relationship with another OSPF routerC. It is used with the OSPF priority values to determine which router will become the DR or BOR in a multi access networkD. It is used to determine which interfaces will send Hello packets to neighboring OSPF routers

Which of the following commands will display the name of the IOS image file being used in a Cisco router?() A. Router# show IOSB. Router# show versionC. Router# show imageD. Router# show protocolsE. Router# show flash

In which solution is a router ACL used?() A. protecting a server frome unauthorized accesB. controlling path selection,based on the route metricC. reducing router CPU utilizationD. filterring packets that are passing through a router

Which is true about OSPF router-id?() A.It is used for type 1 router LSAB.Highest IP address of the loopback is usedC.router-id needs to be matched on ospf neighborsD.router-id is 16 bit

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?() A.show ip access-listB.show access-listC.list ip interfaceD.show interfaceE.show ip interface

Which is true about OSPF router-id?()A、It is used for type 1 router LSAB、Highest IP address of the loopback is usedC、router-id needs to be matched on ospf neighborsD、router-id is 16 bit

Which of the following show commands would be used on the WDS to display the access points participating in fast secure roaming?()A、router# show wlccp apB、router# show wlccp wds apC、router# show wlccp cckmD、router# show wlccp wds cckm

Which of the following commands will display the name of the IOS image file being used in a Cisco router?()A、Router# show IOSB、Router# show versionC、Router# show imageD、Router# show protocolsE、Router# show flash

Which router or router combination is used to calculate the MPLS traffic engineering tunnel path?()A、head-end router and tail-end routerB、middle-point routerC、head-end routerD、tart-end routerE、tail-end router

Which cleaning product should be used for the inside of a computer?()A、glass cleanerB、a simple ammonia and water solution followed by an antistatic solutionC、a bleach solution followed by waterD、compressed air

Which protocol is used to transfer files to on the ERX Edge Router?()A、SCPB、FTPC、RCPD、TFTP

What is the purpose of the OSPF router ID in a OR/BOR election?()A、It is used with the OSPF priority values to determine which OSPF router will become the DR or BOR in a point-to-point networkB、It is used with the OSPF priority values to determine which interface will be used to form a neighbor relationship with another OSPF routerC、It is used with the OSPF priority values to determine which router will become the DR or BOR in a multi access networkD、It is used to determine which interfaces will send Hello packets to neighboring OSPF routers

In which solution is a router ACL used?()A、protecting a server frome unauthorized accesB、controlling path selection,based on the route metricC、reducing router CPU utilizationD、filterring packets that are passing through a router

Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()A、It can be used to block bulk encryption attacksB、It can be used to protect against denial of service attacksC、Traffic originating from the router is considered trusted, so it is not inspectedD、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyE、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()A、show ip access-listB、show access-listC、list ip interfaceD、show interfaceE、show ip interface

Which two of these are correct regarding access control lists? (Choose two.)  ()A、 An ACL can be applied to multiple interlaces.B、 An ACL wildcard mask is identical to an IP subnet mask.C、 There may be multiple ACLs per protocol, per direction, and per interface.D、 There is an "implicit deny" at the end of an ACL and will result in a dropped packet.E、 An ACL acts on all packets, those flowing thru the router and those originated by the router itself.F、 An ACL will be processed from top to bottom and may have multiple matches that will act on the packet that is being tested.

The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?()A、The default administrative distance is used.B、The command is used to establish a static route.C、The command is used to configure the router interfaces.D、The command is used to establish a stub network.E、The subnet mask for the source address is 255.255.255.0

Which of the following troubleshooting steps should be performed NEXT after a core router hasbeen reported down?()A、Implement a solution.B、Establish the outage cause.C、Identify all affected areas.D、Test a solution.

Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering

单选题Which of the following protocols can be used to retrieve system and network performance information from a router?()ALDAPBIMAPCTFTPDSNMP

单选题An administrator needs to update a router configuration for a router that does not support SSH.Which of the following can be used to securely update the router configuration?()AFTPBSNMPv2CTFTPDKTTPS

单选题Which router or router combination is used to calculate the MPLS traffic engineering tunnel path?()Ahead-end router and tail-end routerBmiddle-point routerChead-end routerDtart-end routerEtail-end router

单选题When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()Ashow ip access-listBshow access-listClist ip interfaceDshow interfaceEshow ip interface

多选题Which two of these are correct regarding access control lists? (Choose two.)  ()AAn ACL can be applied to multiple interlaces.BAn ACL wildcard mask is identical to an IP subnet mask.CThere may be multiple ACLs per protocol, per direction, and per interface.DThere is an implicit deny at the end of an ACL and will result in a dropped packet.EAn ACL acts on all packets, those flowing thru the router and those originated by the router itself.FAn ACL will be processed from top to bottom and may have multiple matches that will act on the packet that is being tested.

单选题Which cleaning product should be used for the inside of a computer?()Aglass cleanerBa simple ammonia and water solution followed by an antistatic solutionCa bleach solution followed by waterDcompressed air