多项选择题
What three pieces of information can be used in an extended access list to filter traffic? (Choose three.)()
A.protocol
B.VLAN number
C.TCP or UDP port numbers
D.source switch port number
E.source IP address and destination IP address
F.source MAC address and destination MAC address
相关考题
-
单项选择题
Youandaco-workerhaveestablishedwirelesscommunicationdirectlybetweenyourwirelesslaptops.Whattypeofwirelesstopologyhasbeencreated?()
A.BSS
B.ESS
C.IBSS
D.SSID -
单项选择题
Duringstartup,therouterdisplaysthefollowingerrormessage:boot:cannotopen"flash:"Whatwilltherouterdonext?()
A.Because of damaged flash memory, the router will fail the POST
B.It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialog.
C.It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM
D.It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog.
E.It will attempt to locate the configuration file from a TFTP server. If this fails, it will load a limited configuration from ROM -
单项选择题
Whatdoesthe"InsideGlobal"addressrepresentintheconfigurationofNAT?()
A.the summarized address for all of the internal subnetted addresses
B.the MAC address of the router used by inside hosts to connect to the Internet
C.a globally unique, private IP address assigned to a host on the inside network
D.a registered address that represents an inside host to an outside network
