A. access-list 101 in
B. access-list 101 out
C. ip access-group 101 in
D. ip access-group 101 out
广告位招租 联系QQ:5245112(WX同号)
您可能感興趣的試卷
你可能感興趣的試題
A. access-list 101 deny tcp 192.168.1.128 0.0.0.15 192.168.1.5 0.0.0.0 eq 23 access-list 101 permit ip any any
B. access-list 101 deny tcp 192.168.1.128 0.0.0.240 192.168.1.5 0.0.0.0 eq 23 access-list 101 permit ip any any
C. access-list 1 deny tcp 192.168.1.128 0.0.0.255 192.168.1.5 0.0.0.0 eq 21 access-list 1 permit ip any any
D. access-list 1 deny tcp 192.168.1.128 0.0.0.15 host 192.168.1.5 eq 23 access-list 1 permit ip any any
A. L2TP
B. IPsec
C. PPTP
D. RSA
A. PVST+reduces the CPU cycles for all the switches in the network
B. PVST+automatically selects the root bridge location,to provide optimized bandwidth usage.
C. PVST+allow the root switch location to be optimized per vlan.
D. PVST+supports Layer 3 load balancing without loops.
A. access-list 50 deny 192.168.1.1 0.0.0.255
B. access-list 110 permit ip any any
C. access-list 2500 deny tcp any host 192.168.1.1 eq 22
D. access-list 101 deny tcp any host 192.168.1.1
A. you can apply multiple access lists with the same protocol or in different direction.
B. you can config one access list,per direction,per layer 3 protocol
C. you can place as many access lists as you want on any interface
D. you can apply only one access list on any interface
最新試題
What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()
Which command displays the CHAP authentication process as it occurs between two routers?()
Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()
What is the purpose of the cisco Vlan Trunking protocol?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()
Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()
Which IPsec security protocol should be used when confidentiality is required?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0
What is the default administrative distance of OSPF?()