The best match of the ACL entries will be used for granularity of control.
They use source IP information for matching operations.
They use source and destination IP information for matching operations.
They use source IP information along with protocol-type information for finer granularity of control.
第1题:
A.you can apply multiple access lists with the same protocol or in different…
B.you can config one access list,per direction,per layer 3 protocol
C.you can placeasmanyaccess lists as you want on any interface
D.you can apply ony one access list on any interface
第2题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第3题:
A. Individual statements in a named access list may be deleted.
B. They require a numbered range from 1000 to 1099.
C. When created, they must be specified as standard or extended.
D. They are created with the ip access-list command.
E. The entire access list must be deleted before editing.
F. They are applied with the ip name-group command.
第4题:
Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()
第5题:
A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()
第6题:
Which of the following are characteristics of named access lists?()
第7题:
Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()
第8题:
A. The source and destination addresses
B. The destination port number
C. The destination address
D. The source address
E. All of the above
第9题:
What are two step needed to define a QoS policy for a traffic class?()
第10题:
A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()