單項選擇題

Study the information and the relevant configuration file below for the Testking Branch router
What additional command must be executed on the Branch router before interesting traffic will initiate an ISDN call?()

A. (config-if)# dialer-group 1
B. (config-if)# dialer-list 1
C. (config-if)# dialer map 1
D. (config-if)# dialer-route 1


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN:How will the above access lists affect traffic?()

A. FTP traffic from 192.169.1.22 will be denied.
B. No traffic, except for FTP traffic will be allowed to exit E0.
C. FTP traffic from 192.169.1.9 to any host will be denied.
D. All traffic exiting E0 will be denied.
E. All FTP traffic to network 192.169.1.9/29 will be denied.

3.單項選擇題Which of the following statements regarding the use of multiple access lists are valid when configuring a single interface on a Cisco router?()

A. Application of up to three access lists per protocol to a single interface.
B. No more than two access lists per interface.
C. One access list may be configured per direction for each Layer 3 protocol configured on an interface.
D. The maximum number allowed varies due to RAM availability in the router.
E. An infinite number of access lists that can be applied to an interface, from most specific to most general.
F. Cisco IOS allows only one access list to an interface.

4.多項選擇題

You're the systems administrator at Testing, and you create the following access control lists.
You then enter the command "ip access-group 101 in" to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()

A. Telnet sessions from host A to host 5.1.1.10
B. Telnet sessions from host A to host 5.1.3.10
C. Telnet sessions from host B to host 5.1.2.10
D. Telnet sessions from host B to host 5.1.3.8
E. Telnet sessions from host C to host 5.1.3.10
F. Telnet sessions from host F to host 5.1.1.10

5.單項選擇題You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()

A. permit access-list 101 out
B. ip access-group 101 out
C. apply access-list 101 out
D. access-class 101 out
E. ip access-list e0 out

最新試題

Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity?()

題型:單項選擇題

Which connections allow the use of full-duplex Ethernet?()

題型:多項選擇題

A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()

題型:多項選擇題

What is the subnetwork address for a host with IP address 201.100.5.68/28?()

題型:單項選擇題

Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()

題型:多項選擇題

Which statement describes the rule of split horizon?()

題型:單項選擇題

An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()

題型:多項選擇題

A router with a serial interface will be used for an ISDN link.What other function group devices are required to complete the connection to the service provider? ()

題型:多項選擇題

Which of the following correctly describe steps in the OSI data encapsulation process?()

題型:多項選擇題

What feature of a networks switch allows an administrative to create separate broadcast domains?()

題型:單項選擇題