Which two statements apply to dynamic access lists?()

题目
多选题
Which two statements apply to dynamic access lists?()
A

they offer simpler management in large internetworks.

B

you can control logging messages.

C

they allow packets to be filtered based on upper-layer session information.

D

you can set a time-based security policy.

E

they provide a level of security against spoofing.

F

they are used to authenticate individual users

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which statement about access lists that are applied to an interface is true?()

A.you can apply multiple access lists with the same protocol or in different…

B.you can config one access list,per direction,per layer 3 protocol

C.you can placeasmanyaccess lists as you want on any interface

D.you can apply ony one access list on any interface


参考答案:D

第2题:

Which configuration option will cause the link between two Cisco 3600 Series Multiservice Platforms to become a functional trunk?()

  • A、switchport dynamic auto switchport dynamic auto
  • B、switchport access vlan 10 switchport mode dynamic desireable
  • C、switchport mode trunk switchport nonegotiate
  • D、Leave both ports with the default trunk settings

正确答案:B

第3题:

Which two statements are correct concerning DHCP Internal Server and DHCP External Server in the E-series router? ()(Choose two.)

A. They provide dynamic IP addresses for DSIs.

B. They provide dynamic IP addresses for SRC applications.

C. They provide dynamic IP addresses from pools for PPPoE subscribers.

D. They provide dynamic IP addresses from pools for Routed IP subscribers.


参考答案:A, B

第4题:

Which two statements apply to dynamic access lists?()

  • A、they offer simpler management in large internetworks.
  • B、you can control logging messages.
  • C、they allow packets to be filtered based on upper-layer session information.
  • D、you can set a time-based security policy.
  • E、they provide a level of security against spoofing.
  • F、they are used to authenticate individual users

正确答案:C,D

第5题:

Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()

  • A、It is used in multihome network scenarios.
  • B、It can be used with BGP to mitigate DoS and DDoS.
  • C、It does not need to have CEF enabled.
  • D、It is enabled via the interface level command ip verify unicast reverse-path.
  • E、It cannot be used with "classification" access lists.

正确答案:A,B

第6题:

Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

A.It specifies use of a static encryption key that must be changed frequently to enhance security

B.It requires use of an open authentication method

C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection

D.It requires that all access points and wireless devices use the same encryption key

E.It includes authentication by PSK


参考答案:C, E

第7题:

Which two of these statements best describe the benefits of WPAv2? (Choose two.)()

  • A、 SSID broadcast prevention
  • B、 man-in-the-middle attack protection
  • C、 cost reduction through software upgrades in all existing hardware
  • D、 dynamic key generation
  • E、 RF jamming prevention

正确答案:B,D

第8题:

Which of the following answer choices are correct characteristics of named access list?()

A. You can delete individual statements in a named access list

B. Named access lists require a numbered range from 1000 to 1099.

C. Named access lists must be specified as standard or extended.

D. You can use the ip access-list command to create named access lists.

E. You cannot delete individual statements in a named access list.

F. You can use the ip name-group command to apply named access lists.


参考答案:A, C, D

第9题:

Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()

  • A、Application of up to three access lists per protocol to a single interface.
  • B、No more than two access lists per interface.
  • C、One access list may be configured per direction for each Layer 3 protocol configured on an interface.
  • D、The maximum number allowed varies due to RAM availability in the router.
  • E、An infinite number of access lists that can be applied to an interface, from most specific to most general.
  • F、Cisco IOS allows only one access list to an interface.

正确答案:C

第10题:

What are two step needed to define a QoS policy for a traffic class?()

  • A、determine a minimum bandwidth guarantee
  • B、determine interfaces to which to apply policy
  • C、assign priorities to the class
  • D、configure access control lists

正确答案:A,C

更多相关问题