What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

题目
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

A.protocol

B.VLAN number

C.TCP or UDP port numbers

D.source switch port number

E.source IP address and destination IP address

F.source MAC address and destination MAC address

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What are three characteristics of a service tunnel? ()(Choose three.)

A. It is bidirectional.

B. It carries optimized traffic.

C. It can carry traffic using UDP.

D. It is formed only within a community


参考答案:B, C, D

第2题:

What are the three main parts of a syslog message? ()(Choose three.)

  • A、severity level
  • B、facility
  • C、log message name
  • D、time stamp
  • E、error codes
  • F、access privilege

正确答案:A,C,D

第3题:

Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)

A. routing-instance

B. zone

C. interface

D. policy

E. rule-set


参考答案:A, B, C

第4题:

Which three statistics does the Executive report summarize?() (Choose three.)

  • A、latency and loss
  • B、compression results
  • C、traffic (by application)
  • D、CRC and alignment errors
  • E、user access (by username)

正确答案:A,B,C

第5题:

What are two reasons that a network administrator would use access lists (Choose two.)()。

  • A、to control vty access into a router
  • B、to control broadcast traffic through a router
  • C、to filter traffic as it passes through a router
  • D、to filter traffic that originates from the router
  • E、to replace passwords as a line of defense against security incursions

正确答案:A,C

第6题:

Which three statistics does the Executive report summarize?() (Choose three.)

A. latency and loss

B. compression results

C. traffic (by application)

D. CRC and alignment errors

E. user access (by username)


参考答案:A, B, C

第7题:

An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。

  • A、FTP
  • B、Telnet
  • C、SMTP
  • D、DNS
  • E、HTTP
  • F、POP3

正确答案:D,E,F

第8题:

Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

A. access profile

B. client group

C. client

D. default profile

E. external


参考答案:A, B, C

第9题:

What are three pieces of information that the Cisco IOS show inventory command displays on a Cisco ISR Router? ()(Choose three.)

  • A、Installed Hardware serial numbers
  • B、The status of installed hardware
  • C、Installed hardware
  • D、Unique Device Identifier
  • E、system internal temperature
  • F、main power supply condition

正确答案:A,C,D

第10题:

What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

  • A、protocol
  • B、VLAN number
  • C、TCP or UDP port numbers
  • D、source switch port number
  • E、source IP address and destination IP address
  • F、source MAC address and destination MAC address

正确答案:A,C,E

更多相关问题