多項選擇題Which three statements accurately describe IOS Firewall configurations?()

A.The IP inspection rule can be applied in the inbound direction on the secured interface
B.The IP inspection rule can be applied in the outbound direction on the unsecured interface
C.The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.
D.For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

A.Access-list 101 was configured for the trusted interface, and access-list 100 was configured forthe untrusted interface
B.Access-list 100 was configured for the trusted interface, and access-list 101 was configured forthe untrusted interface
C.Access-list 100 was configured for the inbound direction, and access-list 101 was configured forthe outbound direction on the trusted interface
D.Access-list 100 was configured for the inbound direction, and access-list 101 was configured forthe outbound direction on the untrusted interface

最新試題

Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.

題型:問答題

Which statement correctly describes IPsec VPN backup technology?()

題型:單項選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

Which three statements accurately describe IOS Firewall configurations?()

題型:多項選擇題

Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)

題型:問答題

As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()

題型:單項選擇題

Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.

題型:問答題

IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()

題型:單項選擇題

This item contains several questions that you must answer. You can view these questions byclicking on the Questions button to the left. Changing questions can be accomplished by clicking the numbers to the left of each question. In order to complete the questions, you will need to referto the SDM and the topology, neither of which is currently visible.To gain access to either the topology or the SDK click on the button to left side of the screen thatcorresponds to the section you wish to access. When you have finished viewing the topology theSDK you can return to your questions by clicking on the Questions button to the left.Which defined peer IP address an local subnet belong to Crete?()

題型:多項選擇題

Drag and drop each management protocol on the above to the correct category on the below.

題型:問答題