The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()
A.from host PC1 to host 5.1.1.10
B.from host PC1 to host 5.1.3.10
C.from host PC2 to host 5.1.2.10
D.from host PC2 to host 5.1.3.8
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit.Which is the most efficient summarization that R1 can use to advertise its networks toR2?()
A.172.1.4.0/22
B.172.1.0.0/21
C.172.1.0.0/22
D.172.1.4.0/25 172.1.4.128/25 172.1.5.0/24 172.1.6.0/24 172.1.7.0/24
E.172.1.4.0/24 172.1.5.0/24 172.1.6.0/24 172.1.7.0/24
A.It establishes a static route to the 172.16.3.0 network.
B.It establishes a static route to the 192.168.2.0 network.
C.It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.
D.It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.
E.It uses the default administrative distance.
F.It is a route that would be used last if other routes to the same destination exist.
A.It allows switches to read frame tags.
B.It allows ports to be assigned to VLANs automatically.
C.It maintains VLAN consistency across a switched network.
D.It allows frames from multiple VLANs to use a single interface.
E.It allows VLAN information to be automatically propagated throughout the switching environment.
A.Security increases because only the network administrator may change the routing tables.
B.Configuration complexity decreases as network size increases.
C.Routing updates are automatically sent to neighbors.
D.Route summarization iscompued automatically by the router.
E.Routing traffic load is reduced when used in stub network links.
F.An efficient algorithm is used to build routing tables,using automatic updates.
G.Routing tables adapt automatically to topology changes.
A.after broken links are re-established
B.in an improperly implemented redundant topology
C.when upper-layer protocols require high reliability
D.during high traffic periods
E.when a dual ring topology is in use
最新試題
要將數(shù)據(jù)包發(fā)送到遠(yuǎn)程網(wǎng)絡(luò),應(yīng)使用哪種設(shè)備?()
請(qǐng)參見圖示。網(wǎng)絡(luò)中的主機(jī)A 正在向主機(jī)B 發(fā)送數(shù)據(jù)段。有關(guān)所交換的數(shù)據(jù)段的流量控制如圖所示。下列關(guān)于此通信的陳述,哪兩項(xiàng)是正確的?()
OSI 哪一層可提供有序的數(shù)據(jù)重構(gòu)服務(wù)?()
何時(shí)必須使用clock rate 命令配置路由器串行接口?()
請(qǐng)參見圖示。主機(jī)A 正在訪問(wèn)多臺(tái)服務(wù)器。結(jié)合使用什么端口號(hào)和地址即可唯一識(shí)別特定服務(wù)器上運(yùn)行的特定進(jìn)程?()
請(qǐng)參見圖示。一臺(tái)主機(jī)正使用NAT 連接到Internet。下列哪三項(xiàng)IP 地址可實(shí)現(xiàn)此連接?()
請(qǐng)參見圖示。哪種邏輯拓?fù)涫菍?duì)圖示網(wǎng)絡(luò)的準(zhǔn)確描述?()
請(qǐng)參見圖示。主機(jī)A 嘗試與主機(jī)C 建立TCP/IP 會(huì)話。在嘗試期間,路由器Y 的FastEthernet 接口fa0/1捕獲到一個(gè)幀。捕獲的幀中包含源IP 地址為172.16.1.5而目的IP 地址為172.16.7.24的數(shù)據(jù)包。捕獲該幀時(shí),它的源MAC 地址是什么?()
請(qǐng)參見圖示。網(wǎng)絡(luò)中的所有設(shè)備均使用默認(rèn)配置。此拓?fù)渲行枰嗌賯€(gè)邏輯地址范圍?()
在Cisco IOS 設(shè)備中,啟動(dòng)配置文件存儲(chǔ)于何處?()