多項(xiàng)選擇題Which of the following are benefits provided with access control lists (ACLs)?()

A. ACLs monitor the number of bytes and packets.
B. Virus detection.
C. ACLs dentify interesting traffic for DDR.
D. ACLs provide IP route filtering.
E. ACLs provide high network availability.
F. ACLs classify and organize network traffic.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題When are packets processed in an inbound access list?()

A. Before they are routed to an outbound interface.
B. After they are routed for outbound traffic.
C. After they are routed to an outbound interface while queuing.
D. Before and after they are routed to an outbound interface.
E. Depends on the configuration of the interface
F. None of the above

2.單項(xiàng)選擇題In which situation would the use of a static route be appropriate?()

A. To configure a route to the first Layer 3 device on the network segment.
B. To configure a route from an ISP router into a corporate network.
C. To configure a route when the administrative distance of the current routing protocolis too low.
D. To reach a network is more than 15 hops away.
E. To provide access to the Internet for enterprise hosts.

3.單項(xiàng)選擇題Which command will configure a default route on a router?()

A. router(config)# ip route 0.0.0.0 10.1.1.0 10.1.1.1
B. router(config)# ip default-route 10.1.1.0
C. router(config)# ip default-gateway 10.1.1.0
D. router(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1

5.多項(xiàng)選擇題You are a technician at TestKing. Your newly appointed TestKing trainee wants to know what the CDP is.What would your reply be?()

A. It is globally enabled by default on Cisco routers.
B. It is globally enabled by default on all routers.
C. It is a proprietary protocol.
D. It is a non-proprietary protocol.
E. It can be used to gather hardware and protocol information about neighbor devices.

最新試題

A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()

題型:?jiǎn)雾?xiàng)選擇題

What should the configuration register value be after successfully completing the password recover procedure and returning the router to normal operation? ()

題型:?jiǎn)雾?xiàng)選擇題

Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()

題型:多項(xiàng)選擇題

Which of the following describe router functions?()

題型:多項(xiàng)選擇題

Which characteristics are representative of a link-state routing protocol?()

題型:多項(xiàng)選擇題

What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()

題型:?jiǎn)雾?xiàng)選擇題

Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()

題型:?jiǎn)雾?xiàng)選擇題

What feature of a networks switch allows an administrative to create separate broadcast domains?()

題型:?jiǎn)雾?xiàng)選擇題

The network 172.12.0.0 needs to be divided into subnets where each subnet has the capacity of 458 IP addresses.What would be the correct subnet mask to accomplish this division keeping the number of subnets at the maximum? ()

題型:?jiǎn)雾?xiàng)選擇題

Which of the following correctly describe steps in the OSI data encapsulation process?()

題型:多項(xiàng)選擇題