What are three default role-mapping rule values that are available for all realms?()A、UsernameB、LDAP userC、CertificateD、Custom expressionsE、Source y IP

题目

What are three default role-mapping rule values that are available for all realms?()

  • A、Username
  • B、LDAP user
  • C、Certificate
  • D、Custom expressions
  • E、Source y IP
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.0 0.0.0.255 any What is the effect of this access list configuration?()

A. permit all packets matching the first three octets of the source address to all destinations

B. permit all packet matching the last octet of the destination address and accept all source addresses

C. permit all packet matching the host bits in the source address to all destinations

D. permit all packet from the third subnet of the network address to all destinations


参考答案:A

第2题:

What are three values that must be the same within a sequence of packets for Netflow to consider them a network flow?()

A.source IP address

B.source MAC address

C.egress interface

D.ingress interface

E.destination IP address

F.IP next-hop


参考答案:A, D, E

第3题:

What are three default role-mapping rule values that are available for all realms?()

A. Username

B. LDAP user

C. Certificate

D. Custom expressions

E. Source y IP


参考答案:A, C, D

第4题:

The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()

  • A、ermit all packets matching the first three octets of the source address to all destinations
  • B、permit all packet matching the last octet of the destination address and accept all source addresses
  • C、permit all packet matching the host bits in the source address to all destinations
  • D、permit all packet from the third subnet of the network address to all destinations

正确答案:A

第5题:

What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

A.protocol

B.VLAN number

C.TCP or UDP port numbers

D.source switch port number

E.source IP address and destination IP address

F.source MAC address and destination MAC address


参考答案:A, C, E

第6题:

What is the purpose using the traceroute command?()

A. to map all the devices on a network.

B. to display the current TCP/IP configuration values.

C. to see how a device MAC address is mapped to its IP address.

D. to see the path a packet will take when traveling to a specified destination.

E. to display the MTU values for each router in a specified network path from source to a destination.


参考答案:D

第7题:

The following configuration line was added to router R1Access-list 101 permit ip 10.25.30.00.0.0.255 anyWhat is the effect of this access list configuration?()

A.ermit all packets matching the first three octets of the source address to all destinations

B.permit all packet matching the last octet of the destination address and accept all source addresses

C.permit all packet matching the host bits in the source address to all destinations

D.permit all packet from the third subnet of the network address to all destinations


参考答案:A

第8题:

What is one of the reasons that custom QoS ACLs are recommended over automatic QoS when configuring ports on a Catalyst 6500 for use with IP phones?()

A. 79xx IP phones do not automatically mark voice packets with non-zero DSCP values.

B. 79xx IP phones do not mark protocol packets such as DHCP, DNS, or TFTP with non-zero DSCP values.

C. 79xx IP phones do not mark voice packets with optimal DSCP values.

D. 79xx IP phones use a custom protocol to communicate CDP information to the switch.


参考答案:B

第9题:

What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。

A.permit all packets matching the first three octets of the source address to all destinations

B.permit all packets matching the last octet of the destination address and accept all source addresses

C.permit all packets from the third subnet of the network address to all destinations

D.permit all packets matching the host bits in the source address to all destinations

E.permit all packets to destinations matching the first three octets in the destination address


参考答案:A

第10题:

What can be specified in IP VACLs?()

  • A、Protocol and IP source only
  • B、IP Source, IP Destination and ports
  • C、IP Source Only
  • D、IP Destination Only

正确答案:B

更多相关问题