A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A. access

题目

A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()

A. access-list 10 permit ip 192.168.147.0 0.0.0.255.255

B. access-list 10 permit ip 192.168.149.0 0.0.0.255.255

C. access-list 10 permit ip 192.168.146.0 0.0.0.0.255

D. access-list 10 permit ip 192.168.146.0 0.0.0.1.255

E. access-list 10 permit ip 192.168.148.0 0.0.0.1.255

F. access-list 10 permit ip 192.168.146.0 255.255.255.0


相似考题
更多“A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts ”相关问题
  • 第1题:

    The network administrator of the Oregon router adds the follwing command to the router configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1. What are the results of adding this command?()

    A. The command establishes a static route

    B. The command invokes a dynamic routing protocol for 192.168.12.0

    C. Traffic for network 192.168.12.0 is forwarded to 172.16.12.1

    D. Traffic for all networks is forwarded to 172.16.12.1

    E. This route is automatically propagated throughout the entire network

    F. Traffic for network 172.16.12.0 is forwarded to the 192.168.12.0 network


    参考答案:A, C

  • 第2题:

    A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()

    A.

    B.

    C.

    D.


    参考答案:B

  • 第3题:

    The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to router) basis?()

    • A、nGenius Real-Time Monitor
    • B、Cisco View
    • C、Device Fault Manager
    • D、Internetwork Performance Monitor

    正确答案:D

  • 第4题:

    A network administrator has configured access list 172 to prevent Telnet and ICMP traffic from reaching a server with the address if 192.168.13.26. Which command can the administrator issue to verify that the access list is working properly?()

    • A、Router# ping 192.168.13.26
    • B、Router# debug access-list 172
    • C、Router# show open ports 192.168.13.26
    • D、Router# show access-list
    • E、Router# show ip interface

    正确答案:A,D,E

  • 第5题:

    You need to decide on the best router redundancy protocol to use in the Company network.  Which  two statements are true about HSRP, VRRP, and GLBP?()

    • A、 GLBP and VRRP allow for MD5 authentication, whereas HSRP does not.
    • B、 HSRP allows for multiple upstream active links being simultaneously used, whereas GLBP  does not.
    • C、 GLBP allows for router load balancing of traffic from a network segment without the different  host IP configurations required to achieve the same results with HSRP.
    • D、 Unlike HSRP and VRRP, GLBP allows automatic selection and simultaneous use of multiple  available gateways.
    • E、 GLBP allows for router load balancing of traffic from a network segment by utilizing the creation  of multiple standby groups.

    正确答案:C,D

  • 第6题:

    What are two reasons that a network administrator would use access lists? (Choose two.) ()。

    • A、to control vty access into a router  
    • B、to control broadcast traffic through a router  
    • C、to filter traffic as it passes through a router  
    • D、to filter traffic that originates from the router  
    • E、to replace passwords as a line of defense against security incursions 

    正确答案:A,C

  • 第7题:

    What is true about access control on bridged and routed VLAN traffic?()

    • A、Router ACLs can be applied to the input and output directions of a VLAN interface
    • B、Bridged ACLs can be applied to the input and output directions of a VLAN interface
    • C、Only router ACLs can be applied to a VLAN interface
    • D、VLAN maps and router ACLs can be used in combination
    • E、VLAN maps can be applied to a VLAN interfac

    正确答案:A,B,D

  • 第8题:

    An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()

    • A、Hub
    • B、Bridge
    • C、Switch
    • D、Router

    正确答案:C

  • 第9题:

    You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()

    • A、Configure a WMI event trigger.
    • B、Configure a Network Monitor capture filter.
    • C、Configure a Network Monitor trigger.
    • D、Configure a System Monitor alert.

    正确答案:C

  • 第10题:

    单选题
    On your newly installed router, you apply the access list illustrated below to interface Ethernet 0 on a Cisco router. The interface is connected to the 192.168.1.8/29 LAN. access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 20 any access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 21 any How will the above access lists affect traffic?()
    A

    All traffic will be allowed to exit E0 except FTP traffic.

    B

    FTP traffic from 192.168.166.19 to any host will be denied.

    C

    FTP traffic from 192.168.166.22 to any host will be denied.

    D

    All traffic exiting E0 will be denied.

    E

    All FTP traffic to network 192.168.166.18/29 from any host will be denied.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    The network administrator would like to generate synthetic traffic using the Service AssuranceAgent contained in Cisco IOS. Which CiscoWorks network management application will be used toreport the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to router) basis?()
    A

     nGenius Real-Time Monitor

    B

     CiscoView

    C

     Device Fault Manager

    D

     Internetwork Performance Monitor


    正确答案: B
    解析: 暂无解析

  • 第12题:

    多选题
    Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().
    A

    requires access lists to identify the voice traffic

    B

    can allow traffic from a device without 802.1X authentication, by MAC address

    C

    can allow traffic from Cisco IP phones by listening to their CDP advertisements

    D

    allows all packets marked with a ToS of 5 to bypass authentication

    E

    allows all IP voice packets to bypass authentication via stateful inspection


    正确答案: B,D
    解析: 暂无解析

  • 第13题:

    A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()

    A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255

    B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255

    C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255

    D.access-list 10 permit ip 192.168.146.0 0.0.1.255

    E.access-list 10 permit ip 192.168.148.0 0.0.1.255

    F.access-list 10 permit ip 192.168.146.0 255.255.255.0


    参考答案:D, E

  • 第14题:

    The network administrator of the Oregon router adds the follwing command to the router configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1. What are the results of adding this command?()

    • A、The command establishes a static route
    • B、The command invokes a dynamic routing protocol for 192.168.12.0
    • C、Traffic for network 192.168.12.0 is forwarded to 172.16.12.1
    • D、Traffic for all networks is forwarded to 172.16.12.1
    • E、This route is automatically propagated throughout the entire network
    • F、Traffic for network 172.16.12.0 is forwarded to the 192.168.12.0 network

    正确答案:A,C

  • 第15题:

    A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()

    • A、access-list 10 permit ip 192.168.147.0 0.0.0.255.255
    • B、access-list 10 permit ip 192.168.149.0 0.0.0.255.255
    • C、access-list 10 permit ip 192.168.146.0 0.0.0.0.255
    • D、access-list 10 permit ip 192.168.146.0 0.0.1.255
    • E、access-list 10 permit ip 192.168.148.0 0.0.1.255
    • F、access-list 10 permit ip 192.168.146.0 255.255.255.0

    正确答案:D,E

  • 第16题:

    A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()

    • A、access-list 10 permit ip 192.168.147.0 0.0.0.255.255 
    • B、access-list 10 permit ip 192.168.149.0 0.0.0.255.255
    • C、access-list 10 permit ip 192.168.146.0 0.0.0.0.255
    • D、access-list 10 permit ip 192.168.146.0 0.0.0.1.255
    • E、access-list 10 permit ip 192.168.148.0 0.0.0.1.255
    • F、access-list 10 permit ip 192.168.146.0 255.255.255.0

    正确答案:D,E

  • 第17题:

    Which of the following are benefits provided with access control lists (ACLs)?()

    • A、ACLs monitor the number of bytes and packets.
    • B、Virus detection.
    • C、ACLs dentify interesting traffic for DDR.
    • D、ACLs provide IP route filtering.
    • E、ACLs provide high network availability.
    • F、ACLs classify and organize network traffic.

    正确答案:C,D

  • 第18题:

    Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().

    • A、requires access lists to identify the voice traffic 
    • B、can allow traffic from a device without 802.1X authentication, by MAC address
    • C、can allow traffic from Cisco IP phones by listening to their CDP advertisements
    • D、allows all packets marked with a ToS of 5 to bypass authentication
    • E、allows all IP voice packets to bypass authentication via stateful inspection

    正确答案:B,C

  • 第19题:

    An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()

    • A、Router routes traffic between different networks and a switch does not
    • B、The new switch is faulty and needs to be replaced and configured correctly
    • C、The firewall needs to be setup to allow traffic to reach the Internet
    • D、The switch needs to be setup to forward data traffic to the Internet

    正确答案:A

  • 第20题:

    You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()

    • A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
    • B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.
    • C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
    • D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

    正确答案:B

  • 第21题:

    多选题
    A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
    A

    access-list 10 permit ip 192.168.147.0 0.0.0.255.255

    B

    access-list 10 permit ip 192.168.149.0 0.0.0.255.255

    C

    access-list 10 permit ip 192.168.146.0 0.0.0.0.255

    D

    access-list 10 permit ip 192.168.146.0 0.0.1.255

    E

    access-list 10 permit ip 192.168.148.0 0.0.1.255

    F

    access-list 10 permit ip 192.168.146.0 255.255.255.0


    正确答案: F,C
    解析: 暂无解析

  • 第22题:

    多选题
    A network administrator is configuring ACLs on a cisco router,to allow traffic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0and192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
    A

    access-list 10 permit ip 192.168.147.0 0.0.0.255.255 

    B

    access-list 10 permit ip 192.168.149.0 0.0.0.255.255

    C

    access-list 10 permit ip 192.168.146.0 0.0.0.0.255

    D

    access-list 10 permit ip 192.168.146.0 0.0.0.1.255

    E

    access-list 10 permit ip 192.168.148.0 0.0.0.1.255

    F

    access-list 10 permit ip 192.168.146.0 255.255.255.0


    正确答案: E,B
    解析: 暂无解析

  • 第23题:

    单选题
    The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()
    A

    nGenius Real-Time Monitor

    B

    CiscoView

    C

    Device Fault Manager

    D

    Internetwork Performance Monitor


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()
    A

    Router routes traffic between different networks and a switch does not

    B

    The new switch is faulty and needs to be replaced and configured correctly

    C

    The firewall needs to be setup to allow traffic to reach the Internet

    D

    The switch needs to be setup to forward data traffic to the Internet


    正确答案: B
    解析: 暂无解析