access-list 101 deny tcp 192.168.1.128 0.0.0.15 192.168.1.5 0.0.0.0 eq 23 access-list 101 permit ip any any
access-list 101 deny tcp 192.168.1.128 0.0.0.240 192.168.1.5 0.0.0.0 eq 23 access-list 101 permit ip any any
access-list 1 deny tcp 192.168.1.128 0.0.0.255 192.168.1.5 0.0.0.0 eq 21 access-list 1 permit ip any any
access-list 1 deny tcp 192.168.1.128 0.0.0.15 host 192.168.1.5 eq 23 access-list 1 permit ip any any
第1题:
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
A. WEP encryption
B. Channel rotation
C. Disable SSID
D. WPA encryption
第2题:
A.netstat
B.traceroute
C.nbtstat
D.ping
第3题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
第4题:
A network administrator wants to add a line to an access list that will block only Telnet access by the hosts on subnet 192.168.1.128/28 to the server at 192.168.1.5.What command should be issued to accomplish this task?()
第5题:
A network administrator wants to add a line to an access list that will block only Telnet access by the hosts on subnet 192.168.1.128/28 to the server at 192.168.1.5. What command should be issued to accomplish this task?()
第6题:
An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()
A. Disable SSID
B. WPA
C. MAC filtering
D. RAS
第7题:
A customer wants to TFTP a new image from the corporate network to Flash on the Teleworker router through the IPSec tunnel. How should you configure the Teleworker router?()
第8题:
A.IDS
B.IPS
C.Firewall
D.Managed PKI
第9题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第10题:
A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()