Which three statements are true when configuring Cisco IOS F

题目
多选题
Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()
A

A custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.

B

An optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.

C

Custom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.

D

Only the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.

E

The outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.

F

The SDM provides a basic, intermediate, and advanced firewall wizard.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()

A. Application of up to three access lists per protocol to a single interface.

B. No more than two access lists per interface.

C. One access list may be configured per direction for each Layer 3 protocol configured on an interface.

D. The maximum number allowed varies due to RAM availability in the router.

E. An infinite number of access lists that can be applied to an interface, from most specific to most general.

F. Cisco IOS allows only one access list to an interface.


参考答案:C

第2题:

Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()

  • A、A custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.
  • B、An optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.
  • C、Custom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.
  • D、Only the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.
  • E、The outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.
  • F、The SDM provides a basic, intermediate, and advanced firewall wizard.

正确答案:A,B,E

第3题:

After making some network changes you power off and then power on your Cisco router named VE1. What sequence of events occurs when VE1 is powered up?

A. Perform. POST, locate configuration statements, apply configuration statements, locate Cisco IOS software, and load Cisco IOS software.

B. Locate Cisco IOS software, load Cisco IOS software, locate configuration statements, apply configuration statements, and perform. POST.

C. Test software routines, POST, load configuration files, load Cisco IOS software, test Cisco IOS software.

D. Perrform. POST, locate Cisco IOS software, load the Cisco IOS software, locate configuration statements, and apply configuration statements.

E. Load and test IOS, load configuration files, test software routines, POST.

F. None of the above


正确答案:D
D 解析:Explanation:
Upon initial start up, Cisco routers perform. the following steps in order:
1. The router performs a power-on self-test (POST) to discover and verify the hardware.
2. The router loads and runs bootstrap code from ROM.
3. The router finds the IOS or other software and loads it.
4. The router finds the configuration file and loads it into running config.

第4题:

Which three products reside on the UC500 platform?()

  • A、Cisco Unified Communications ManagerExpress
  • B、Cisco IOS Firewall
  • C、Cisco UnifiedContact Center
  • D、Cisco IOS
  • E、Cisco Unity Express
  • F、Cisco UnifiedCallConnector

正确答案:A,D,E

第5题:

Cisco IOS NetFlow gathers data that can be used in which three of these? ()

  • A、 accounting
  • B、 authentication
  • C、 authorization
  • D、 network monitoring
  • E、 network planning

正确答案:A,D,E

第6题:

Which result is of securing the Cisco IOS image by use of the Cisco IOS image resilience feature?()

  • A、The Cisco IOS image file will not be visible in the output from the show flash command.
  • B、The show version command will not show the Cisco IOS image file location.
  • C、When the router boots up, the Cisco IOS image will be loaded from a secured FTP location.
  • D、The running Cisco IOS image will be encrypted and then automatically backed up to a TFTP server.

正确答案:A

第7题:

When the Cisco IOS OSPF command ip ospf dead-interval minimal hello-multiplier 5 is configured, which two statements are true? ()

  • A、OSPF hello interval is 5 seconds
  • B、OSPF hello interval is 1 second
  • C、OSPF dead interval is 1 second
  • D、OSPF dead interval is 5 seconds
  • E、OSPF dead interval is 20 seconds
  • F、OSPF hello interval is 0.2 second

正确答案:C,F

第8题:

Which three of the following steps are mandatory when configuring MPLS on Cisco IOS? ()(Choose three.)

A. start LDP

B. enable CEF switching

C. configure the MPLS ID

D. disable IP TTL propagation

E. configure conditional label advertising

F. enable label switching on frame mode interfaces


参考答案:A, B, F

第9题:

Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()

  • A、Application of up to three access lists per protocol to a single interface.
  • B、No more than two access lists per interface.
  • C、One access list may be configured per direction for each Layer 3 protocol configured on an interface.
  • D、The maximum number allowed varies due to RAM availability in the router.
  • E、An infinite number of access lists that can be applied to an interface, from most specific to most general.
  • F、Cisco IOS allows only one access list to an interface.

正确答案:C

第10题:

When configuring Cisco IOS login enhancements for virtual connections, what is the "quiet period"?()

  • A、The period of time in which virtual login attempts are blocked, following repeated failed login attempts
  • B、The period of time in which virtual logins are blocked as security services fully initialize
  • C、A period of time when no one is attempting tolog in
  • D、The period of time between successive login attempts

正确答案:A

更多相关问题