The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()
A.from host PC1 to host 5.1.1.10
B.from host PC1 to host 5.1.3.10
C.from host PC2 to host 5.1.2.10
D.from host PC2 to host 5.1.3.8
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit.Which is the most efficient summarization that R1 can use to advertise its networks toR2?()
A.172.1.4.0/22
B.172.1.0.0/21
C.172.1.0.0/22
D.172.1.4.0/25 172.1.4.128/25 172.1.5.0/24 172.1.6.0/24 172.1.7.0/24
E.172.1.4.0/24 172.1.5.0/24 172.1.6.0/24 172.1.7.0/24
A.It establishes a static route to the 172.16.3.0 network.
B.It establishes a static route to the 192.168.2.0 network.
C.It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.
D.It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.
E.It uses the default administrative distance.
F.It is a route that would be used last if other routes to the same destination exist.
A.It allows switches to read frame tags.
B.It allows ports to be assigned to VLANs automatically.
C.It maintains VLAN consistency across a switched network.
D.It allows frames from multiple VLANs to use a single interface.
E.It allows VLAN information to be automatically propagated throughout the switching environment.
A.Security increases because only the network administrator may change the routing tables.
B.Configuration complexity decreases as network size increases.
C.Routing updates are automatically sent to neighbors.
D.Route summarization iscompued automatically by the router.
E.Routing traffic load is reduced when used in stub network links.
F.An efficient algorithm is used to build routing tables,using automatic updates.
G.Routing tables adapt automatically to topology changes.
A.after broken links are re-established
B.in an improperly implemented redundant topology
C.when upper-layer protocols require high reliability
D.during high traffic periods
E.when a dual ring topology is in use
最新試題
請參見圖示。主機(jī)B 嘗試與主機(jī)C 建立TCP/IP 會話。在嘗試期間,San Francisco 器由器的FastEthernet 接口fa0/1捕獲到一個幀。捕獲的幀中包含源IP 地址為10.10.1.2而目的IP 地址為10.31.1.20的數(shù)據(jù)包。捕獲該幀時,它的目的MAC 地址是什么?()
請參見圖示。網(wǎng)絡(luò)中的主機(jī)A 正在向主機(jī)B 發(fā)送數(shù)據(jù)段。有關(guān)所交換的數(shù)據(jù)段的流量控制如圖所示。下列關(guān)于此通信的陳述,哪兩項(xiàng)是正確的?()
請參見圖示。主機(jī)X 和主機(jī)Y 與本地網(wǎng)絡(luò)的通信受到限制。此問題的原因是什么?()
OSI 哪一層可提供有序的數(shù)據(jù)重構(gòu)服務(wù)?()
請參見圖示。電纜1和電纜2分別按照特定的物理層要求接線。哪三個網(wǎng)段使用電纜2?()
請參見圖示。網(wǎng)絡(luò)技術(shù)人員試圖確定主機(jī)A 的正確IP 地址配置。以下哪一項(xiàng)是主機(jī)A 的有效配置?()
請參見圖示。已啟用路由器的NAT 功能供PC 訪問Internet。可以為路由器接口S0/0/0分配下列哪一個IP 地址?()
請參見圖示。對于從主機(jī)A 向Web 服務(wù)器發(fā)出的網(wǎng)頁請求,正確的目的套接字?jǐn)?shù)字是什么?()
請參見圖示。下列哪組設(shè)備僅包含中間設(shè)備?()
請參見圖示。當(dāng)計算機(jī)A 向計算機(jī)D 發(fā)送幀時,哪些計算機(jī)會接收該幀?()