A.they offer simpler management in large internetworks.
B.you can control logging messages.
C.they allow packets to be filtered based on upper-layer session information.
D.you can set a time-based security policy.
E.they provide a level of security against spoofing.
F.they are used to authenticate individual users.
第1题:
Which configuration option will cause the link between two Cisco 3600 Series Multiservice Platforms to become a functional trunk?()
第2题:
Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()
第3题:
Which two statements apply to dynamic access lists?()
第4题:
A network administrator needs to configure port security on a switch.which two statements are true?()
第5题:
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
第6题:
What are two steps needed to define a QoS policy for a traffic class?()
第7题:
Which statement about access lists that are applied to an interface is true?()
第8题:
They provide dynamic IP addresses for DSIs.
They provide dynamic IP addresses for SRC applications.
They provide dynamic IP addresses from pools for PPPoE subscribers.
They provide dynamic IP addresses from pools for Routed IP subscribers.
第9题:
they offer simpler management in large internetworks.
you can control logging messages.
they allow packets to be filtered based on upper-layer session information.
you can set a time-based security policy.
they provide a level of security against spoofing.
they are used to authenticate individual users.
第10题:
Provide dynamic IPaddressesforDSIs.
Provide connectivity to DHCP servers on other subnetworks.
Provide dynamic IP addresses for SRC applications.
Provide dynamic IP addresses from pools used for PPPoE subscribers.
第11题:
You can delete individual statements in a named access list
Named access lists require a numbered range from 1000 to 1099.
Named access lists must be specified as standard or extended.
You can use the ip access-list command to create named access lists.
You cannot delete individual statements in a named access list.
You can use the ip name-group command to apply named access lists.
第12题:
Which two of these statements best describe the benefits of WPAv2? (Choose two.)()
第13题:
Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()
第14题:
What are two step needed to define a QoS policy for a traffic class?()
第15题:
Which two statements are correct concerning DHCP Internal Server and DHCP External Server in the E-series router? ()(Choose two.)
第16题:
A network administrator needs to configure port security on a switch.which two statements are true?()
第17题:
Which two statements about static NAT translations are true?()
第18题:
Application of up to three access lists per protocol to a single interface.
No more than two access lists per interface.
One access list may be configured per direction for each Layer 3 protocol configured on an interface.
The maximum number allowed varies due to RAM availability in the router.
An infinite number of access lists that can be applied to an interface, from most specific to most general.
Cisco IOS allows only one access list to an interface.
第19题:
they offer simpler management in large internetworks.
you can control logging messages.
they allow packets to be filtered based on upper-layer session information.
you can set a time-based security policy.
they provide a level of security against spoofing.
they are used to authenticate individual users
第20题:
you can apply multiple access lists with the same protocol or in different…
you can config one access list,per direction,per layer 3 protocol
you can placeasmanyaccess lists as you want on any interface
you can apply ony one access list on any interface
第21题:
you can apply multiple access lists with the same protocol or in different direction.
you can config one access list,per direction,per layer 3 protocol
you can place as many access lists as you want on any interface
you can apply only one access list on any interface
第22题:
They are always present in the NATt able.
They allow connection to be initiated from the outside.
They can be configured with access lists,to allow two or more connections to be initiated from the outside.
They require no inside or outside interface markings because addresses are statically defined.