试卷名称:思科认证640-802模拟试卷28

上一题: What is one reason that WPA encrypt...
下一题: When a router is connected to a Fra...
单选题

An access list has been designed to prevent HTTP traffic from the Accounting Department from reaching the HR server attached to the Holyoke router. Which of the following access lists will accomplish this task when grouped with the e0 interface on the Chicopee router?   

A.permit ip any any deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80

B.permit ip any any deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80

C.deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80 permit ip any any

D.deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80 permit ip any any

您可能感兴趣的题目

A Cisco router that was providing Frame Relay connectivity at a remote site was replaced with a different vendor’s frame relay router. Connectivity is now down between the central and remote site. What is the most likely cause of the problem? mismatched LMI types incorrect DLCI mismatched encapsulation types incorrect IP address mapping
Refer to the exhibit. What can be determined about routes that are learned from the router at IP address 190.171.23.12? [*] HQ_Router last received an update from 190.171.23.12 at 3:30 am. If HQ_Router does not receive an update from 190.171.23.12 in 30 seconds, all routes from that source will be removed from the routing table. If HQ_Router does not receive an update from 190.171.23.12 in 30 seconds, all routes from that source will be flagged with a hold-down timer. 190.171.23.12 is expected to send an update to HQ_Router for network 190.172.0.0 in 3 minutes and 30 seconds.
Refer to the exhibit. Why are two OSPF designated routers identified on Core_Router? [*] Core_Router is connected to more than one multiaccess network. The router at 208.149.23.130 is a secondary DR in case the primary fails. Two router IDs have the same OSPF priority and are therefore tied for DR election. The DR election is still underway and there are two contenders for the role.
An access list has been designed to prevent HTTP traffic from the Accounting Department from reaching the HR server attached to the Holyoke router. Which of the following access lists will accomplish this task when grouped with the e0 interface on the Chicopee router? [*] permit ip any any deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80 permit ip any any deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80 deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80 permit ip any any deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80 permit ip any any
If an ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet? 1024 2046 4094 4096 8190
Acknowledgements, sequencing, and flow control are characteristics of which OSI layer? Layer 2 Layer 3 Layer 4 Layer 5 Layer 6
Which protocol provides a method of sharing VLAN configuration information between switches? VTP STP ISL 802.1Q VLSM
The Ethernet networks connected to router R1 in the graphic have been summarized for router R2 as 192.1.144.0/20. Which of the following packet destination addresses will R2 forward to R1, according to this summary? [*] 192.1.159.2 192.1.160.11 192.1.138.41 192.1.151.254 192.1.143.145
A router learns about a remote network from EIGRP, OSPF, and a static route. Assuming all routing protocols are using their default administrative distance, which route will the router use to forward data to the remote network? The router will use the static route. The router will use the OSPF route. The router will use the EIGRP route. The router will load balance and use all three routes.
Refer to the exhibit. A new subnet with 12 hosts has been added to the network. Which subnet address should this network use to provide enough useable addresses while wasting the fewest addresses? [*] 192.168.10.80/28 192.168.10.80/29 192.168.10.96/28 192.168.10.96/29
What is one reason that WPA encryption is preferred over WEP? A WPA key is longer and requires more special characters than the WEP key. The access point and the client are manually configured with different WPA key values. WPA key values remain the same until the client configuration is changed. The values of WPA keys can change dynamically while the system is used.
When a router is connected to a Frame Relay WAN link using a serial DTE interface, how is the interface clock rate determined? It is supplied by the CSU/DSU. It is supplied by the far end router. It is determined by the clock rate command. It is supplied by the Layer 1 bit stream timing.
When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link? By default, all defined VLANs are allowed on the trunk. Each single VLAN, or VLAN range, must be specified with the switchport mode command. Each single VLAN, or VLAN range, must be specified with the vtp domain command. Each single VLAN, or VLAN range, must be specified with the vlan database command.
What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table? The switch will not forward unicast frames. The switch will forward the frame to a specific port. The switch will return a copy of the frame out the source port. The switch will remove the destination MAC from the switch table. The switch will forward the frame to all ports except the port on which it was received.
A network administrator would like to implement NAT in the network shown in the graphic to allow inside hosts to use a private addressing scheme. Where should NAT be configured? [*] Corporate router Engineering router Sales router all routers all routers and switches
Refer to the exhibit. A network associate needs to configure the switches and router in the graphic so that the hosts in VLAN3 and VLAN4 can communicate with the enterprise server in VLAN2. Which two Ethernet segments would need to be configured as trunk links? [*] A B C D E
Which tables of EIGRP route information are held in RAM and maintained through the use of hello and update packets? neighbor table SPF table RTP table topology table query table
Refer to the exhibit. How will router A choose a path to the 10.1.2.0/24 network when different routing protocols are configured? [*] If RIPv2 is the routing protocol, only the path AD will be installed in the routing table by default. If RIPv2 is the routing protocol, the equal cost paths ABD and ACD will be installed in the routing table by default. If EIGRP is the routing protocol, only the path AD will be installed in the routing table by default. If EIGRP is the routing protocol, the equal cost paths ABD and ACD will be installed in the routing table by default. If EIGRP and OSPF are both running on the network, the EIGRP paths will be installed in the routing table.
Which two practices help secure the configuration utilities on wireless access points from unauthorized access? assigning a private IP address to the AP changing the default SSID value configuring a new administrator password changing the mixed mode setting to single mode configuring traffic filtering
Which of the following are key characteristics of PPP? can be used over analog circuits maps Layer 2 to Layer 3 address encapsulates several routed protocols supports IP only provides error correction

相关试卷

  • 思科认证640-802模拟试卷29

  • 思科认证640-802模拟试卷28

  • 思科认证640-802模拟试卷27

  • 思科认证640-802模拟试卷26

  • 思科认证640-802模拟试卷25

  • 思科认证640-802模拟试卷24

  • 思科认证640-802模拟试卷23

  • 思科认证640-802模拟试卷22

  • 思科认证640-802模拟试卷21

  • 思科认证640-802模拟试卷20

  • 思科认证640-802模拟试卷19

  • 思科认证640-802模拟试卷18

  • 思科认证640-802模拟试卷17

  • 思科认证640-802模拟试卷16

  • 思科认证640-802模拟试卷15

  • 思科认证640-802模拟试卷14

  • 思科认证640-802模拟试卷13

  • 用Cisco控制器进行简单网络配置和监控、将独立AP转换为LWAPP练习试卷1

  • 无线网络概念、标准机构练习试卷1

  • 无线流量和AP发现、其他无线技术练习试卷1