多项选择题
What are some general guidelines regarding the placement of access control lists?()
A. You should place standard ACLS as close as possible to the source of traffic to be denied.
B. You should place extended ACLS as close as possible to the source of traffic to be denied.
C. You should place standard ACLS as close as possible to the destination of traffic to be denied.
D. You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.
相关考题
-
单项选择题
Which of the following commands would successfully implement an access list on a routers virtual terminal line?()
A. RouterTK(config-line)# access-class 10 in
B. RouterTK(config-if)# ip access-class 23 out
C. RouterTK(config-line)# access-list 150 in
D. RouterTK(config-if)# ip access-list 128 out
E. RouterTK(config-line)# access-group 15 out
F. RouterTK(config-if)# ip access-group 110 in -
单项选择题
Study the information and the relevant configuration file below for the Testking Branch router What additional command must be executed on the Branch router before interesting traffic will initiate an ISDN call?()
A. (config-if)# dialer-group 1
B. (config-if)# dialer-list 1
C. (config-if)# dialer map 1
D. (config-if)# dialer-route 1 -
单项选择题
The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN:How will the above access lists affect traffic?()
A. FTP traffic from 192.169.1.22 will be denied.
B. No traffic, except for FTP traffic will be allowed to exit E0.
C. FTP traffic from 192.169.1.9 to any host will be denied.
D. All traffic exiting E0 will be denied.
E. All FTP traffic to network 192.169.1.9/29 will be denied.
