首页/ 题库 / [单选题]A network engineer w的答案

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()

单选题
2022-01-03 23:48
A、reflexive
B、extended
C、standard
D、dynamic
查看答案

正确答案
D

试题解析

标签: CCNA(640-802)
感兴趣题目
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
Before shutting off the fuel supply to stop a medium or high–speed diesel engine, why is it necessary to allow the engine to idle for a few minutes?()
What feature of a networks switch allows an administrative to create separate broadcast domains?()
The purpose of the skirt or trunk in four-stroke cycle engines is to act in a similar manner to a ().
It is generally considered unwise to give a child___( )_____ he or she wants.
Propulsion engines and the vast majority of auxiliary generator engines are designed to allow a generous through-flow of scavenge air in order to control ()
If necessary to avoid collision or allow more time to()the situation,a vessel shall slacken her speed or take all way off by stopping or reversing her means of propulsion.
To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise network. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(71). Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(72) activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access has been prohibitive. Fifty-two percent of surveyed CISOs stated that they currently use a moat and castle" security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch(73) of service attacks or steal(74) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with(75) and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.
Refer to the exhibit. Users from the Engineering VLAN complain that every time Business VLAN users have a network connectivity issue,the Engineering VLAN users usually have problems experiencing slow response or network connectivity problems. After troubleshooting, anunauthorized switch 2 was found.This unauthorized switch has been a regular problem, assuming the root bridge function under thespanning-tree domain and causing the Engineering VLAN to be unstable. Which three of these actionscould be suggested to fix the problem?()
When a tug is pulling on a hawser at right angles to the ship,and the pilot wants to come ahead or astern on the ship’s engine,care must be taken that the pilot().
In a Routed 1483 network, a provider doesn't want to configure static routes for its customer networks. Which command allows the ERX to obtain the framed route stored on the RADIUS server?()
A customer wants to create a 1:1 protection group with a DS3N-12 card. Which card slots would allow for a 1:1 protection?()
相关题目
Why did he want to find a shop open selling the Sunday papers or a milkman doing his rounds?
Mr. Baker, a dozen students want to see you. () they wait here or outside?
Police officers are not allowed to join()or to go on strike.
A vessel shall slacken her speed,stop,or reverse her engines,if necessary,to().
As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()
Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?()
You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()
You work as a network engineer at TestKing.com. You are required to allow establishment of a Telnet session with a router TestKingC.Which set command must be configured?()
our network contains a server that runs window server 2008. The serve has the network policy server(NPS) service role installed. You need to allow only members of a global group named group1 VPN access to the network. What should you do?()
A computer network links computers together to allow users to share hardware, software, and(73)
As to the low speed diesel engine, if you want to change the coolant flow for a certain cylinder, you can regulate ().
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()
Which of the following data network would you implement if you wanted a wireless network that had a relatively high data rate, but was limited to very short distances?()
As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)
The Ezonexam network administrator wants to use a router named VE1 to segment the local network. What are some of the advantages of using VE1 to segment the network? (Choose two)
Virus Security Software is designed to detect, eliminate or quarantine computer viruses before they are able to harm a computer or server networked system.
() can be found on most medium to large merchant vessels even if the main engine is either a steam turbine or 2-stroke crosshead engine.
Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?()
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?
广告位招租WX:84302438

免费的网站请分享给朋友吧