itgle.com

You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A. show access-listB. show ip access-listC. show ip i

题目

You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()

A. show access-list

B. show ip access-list

C. show ip interface

D. show interface

E. show interface list


相似考题
更多“You are a technician at TestKing. Your assistant applied an IP access control list to Rout ”相关问题
  • 第1题:

    A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()

    A. The source and destination addresses

    B. The destination port number

    C. The destination address

    D. The source address

    E. All of the above


    参考答案:D

  • 第2题:

    Which of the following are characteristics of named access lists?()

    • A、Individual statements in a named access list may be deleted.
    • B、They require a numbered range from 1000 to 1099.
    • C、When created, they must be specified as standard or extended.
    • D、They are created with the ip access-list command.
    • E、The entire access list must be deleted before editing.
    • F、They are applied with the ip name-group command.

    正确答案:A,C,D

  • 第3题:

    Which statement about access lists that are applied to an interface is true?()

    • A、you can apply multiple access lists with the same protocol or in different direction.
    • B、you can config one access list,per direction,per layer 3 protocol
    • C、you can place as many access lists as you want on any interface
    • D、you can apply only one access list on any interface

    正确答案:B

  • 第4题:

    You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()

    • A、show access-list
    • B、show ip access-list
    • C、show ip interface
    • D、show interface
    • E、show interface list

    正确答案:C

  • 第5题:

    A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()

    • A、The source and destination addresses
    • B、The destination port number
    • C、The destination address
    • D、The source address
    • E、All of the above

    正确答案:D

  • 第6题:

    You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines. What command would assign this access- list to the Virtual Terminal Lines?()

    • A、router(config-line)# ip access-group 1 in
    • B、router(config-line)# access-class 1 in
    • C、router(config-line)# ip access-list 1 in
    • D、router(config-line)# access-line 1 in

    正确答案:B

  • 第7题:

    单选题
    Which command is used to display the placement and direction of an IP access control list on a router?()
    A

    show access-list

    B

    show ip route

    C

    show ip interface

    D

    show interface

    E

    show interface list

    F

    show ip interface brief


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()
    A

    The source and destination addresses

    B

    The destination port number

    C

    The destination address

    D

    The source address

    E

    All of the above


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Your database instance is running. You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.  Which tool or utility would you use to start the listener?()
    A

     Oracle Net Manager

    B

     Listener Control utility

    C

     Database Configuration Assistant

    D

     Oracle Net Configuration Assistant


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
    A

    Source IP and browser

    B

    Source IP and certificate

    C

    Certificate and Host Checker

    D

    Host Checker and source IP


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()
    A

    show access-list

    B

    show ip access-list

    C

    show ip interface

    D

    show interface

    E

    show interface list


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()
    A

    permit access-list 101 out

    B

    ip access-group 101 out

    C

    apply access-list 101 out

    D

    access-class 101 out

    E

    ip access-list e0 out


    正确答案: E
    解析: 暂无解析

  • 第13题:

    Which statement about access lists that are applied to an interface is true?()

    A.you can apply multiple access lists with the same protocol or in different…

    B.you can config one access list,per direction,per layer 3 protocol

    C.you can placeasmanyaccess lists as you want on any interface

    D.you can apply ony one access list on any interface


    参考答案:D

  • 第14题:

    You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()

    • A、permit access-list 101 out
    • B、ip access-group 101 out
    • C、apply access-list 101 out
    • D、access-class 101 out
    • E、ip access-list e0 out

    正确答案:B

  • 第15题:

    Which of the following answer choices are correct characteristics of named access list?()

    • A、You can delete individual statements in a named access list
    • B、Named access lists require a numbered range from 1000 to 1099.
    • C、Named access lists must be specified as standard or extended.
    • D、You can use the ip access-list command to create named access lists.
    • E、You cannot delete individual statements in a named access list.
    • F、You can use the ip name-group command to apply named access lists.

    正确答案:A,C,D

  • 第16题:

    Which statement about access lists that are applied to an interface is true?()

    • A、you can apply multiple access lists with the same protocol or in different…
    • B、you can config one access list,per direction,per layer 3 protocol
    • C、you can placeasmanyaccess lists as you want on any interface
    • D、you can apply ony one access list on any interface

    正确答案:D

  • 第17题:

    A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()

    • A、The traffic is dropped
    • B、The resulting action is determined by the destination IP address
    • C、The source IP address is checked,and,if a match is not found, traffic is routed out interface Serial 1
    • D、The resulting action is determined by the destination IP address and port number

    正确答案:A

  • 第18题:

    Which statement about access lists that are applied to an interface is true?()

    • A、you can apply multiple access lists with the same protocol or in different…
    • B、you can config one access list,per direction,per layer 3 protocol
    • C、you can place as many access lists as you want on any interface
    • D、you can apply ony one access list on any interface

    正确答案:D

  • 第19题:

    单选题
    ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()
    A

     It is a list of remote database links stored in the XML file that are available to the users of the database.

    B

     It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.

    C

     It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.

    D

     It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()
    A

    It is a list of remote database links stored in the XML file that are available to the users of the database.

    B

    It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.

    C

    It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.

    D

    It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Your database instance is running.You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?()
    A

    Oracle Net Manager

    B

    Listener Control utility

    C

    Database Configuration Assistant

    D

    Oracle Net Configuration Assistant


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()
    A

    The traffic is dropped

    B

    The resulting action is determined by the destination IP address

    C

    The source IP address is checked,and,if a match is not found, traffic is routed out interface Serial 1

    D

    The resulting action is determined by the destination IP address and port number


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are displayed. What should you do?()
    A

    Disable referrals.

    B

    Modify the system access control list.

    C

    Enable access-based enumeration (ABE).

    D

    Modify the discretionary access control list.


    正确答案: D
    解析: 暂无解析