多項(xiàng)選擇題Which can be done to secure the virtual terminal interfaces on a router?()

A.Administratively shut down the interfaces.
B.Physically secure the interfaces.
C.Configure a virtual terminal password and login process.
D.Enter an access list and apply it to the terminal interfaces using the access-class command.
E.Create an access list and apply it to the terminal interfaces using the access-group command.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()

A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255
B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255
C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255
D.access-list 10 permit ip 192.168.146.0 0.0.1.255
E.access-list 10 permit ip 192.168.148.0 0.0.1.255
F.access-list 10 permit ip 192.168.146.0 255.255.255.0

2.單項(xiàng)選擇題Which item represents the standard IP ACL?()

A.access-list 50 deny 192.168.1.1 0.0.0.255
B.access-list 110 permit ip any any
C.access-list 2500 deny tcp any host 192.168.1.1 eq 22
D.access-list 101 deny tcp any host 192.168.1.1

3.單項(xiàng)選擇題Which statement about access lists that are applied to an interface is true?()

A.you can apply multiple access lists with the same protocol or in different direction.
B.you can config one access list,per direction,per layer 3 protocol
C.you can place as many access lists as you want on any interface
D.you can apply only one access list on any interface

4.多項(xiàng)選擇題Which two statements about static NAT translations are true?()

A.They are always present in the NAT table.
B.They allow connection to be initiated from the outside.
C.They can be configured with access lists, to allow two or more connections to be initiated from the outside.
D.They require no inside or outside interface markings because addresses are statically defined.

5.多項(xiàng)選擇題When a DHCP server is configured, which two IP addresses should never be assignable to hosts? ()

A.network or subnetwork IP address
B.broadcast address on the network
C.IP address leased to the LAN
D.IP address used by the interfaces
E.manually assigned address to the clients
F.designated IP address to the DHCP server

6.多項(xiàng)選擇題Which two tasks does the Dynamic Host Configuration Protocol perform?()

A.Set the IP gateway to be used by the network.
B.Perform host discovery used DHCPDISCOVER message.
C.Configure IP address parameters from DHCP server to a host.
D.Provide an easy management of layer 3 devices.
E.Monitor IP performance using the DHCP server.
F.Assign and renew IP address from the default pool.

7.單項(xiàng)選擇題Refer to the exhibit. Which rule does the DHCP server use when there is an IP address conflict?()

A.The address is removed from the pool until the conflict is resolved.
B.The address remains in the pool until the conflict is resolved.
C.Only the IP detected by Gratuitous ARP is removed from the pool.
D.Only the IP detected by Ping is removed from the pool.
E.The IP will be shown, even after the conflict is resolved.

8.單項(xiàng)選擇題How does a DHCP server dynamically assign IP addresses to hosts?()

A.Addresses are permanently assigned so that the host uses the same address at all times.
B.Addresses are assigned for a fixed period of time. At the end of the period, a new request for an address must be made, and another address is then assigned.
C.Addresses are leased to hosts. A host will usually keep the same address by periodically contacting the DHCP server to renew the lease.
D.Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.

10.單項(xiàng)選擇題On which options are standard access lists based?()

A.destination address and wildcard mask
B.source address and wildcard mask
C.destination address and subnet mask
D.source address and subnet mask