A. you can apply multiple access lists with the same protocol or in different direction.
B. you can config one access list,per direction,per layer 3 protocol
C. you can place as many access lists as you want on any interface
D. you can apply only one access list on any interface
您可能感興趣的試卷
你可能感興趣的試題
A. spanning-tree mode rapid-pvst
B. spanning-tree uplinkfast
C. spanning-tree backbonefast
D. spanning-tree mode mst
A. they run a spell check on host names to ensure accurate routing
B. they map individual hosts to their specific IP address
C. they convert domain names into IP address
D. Given an IP address,they determine the name of the host that is…
A. Flash,TFTP server,ROM
B. Flash,NVRAM,ROM
C. ROM,NVRAM,TFTP server
D. NVRAM,TFTP server,ROM
E. TFTP server,Flash,NVRAM
A. show session
B. show cdp neighbors
C. show users
D. show queue
A. transport type all
B. transport output all
C. transport preferred all
D. transport input all
最新試題
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
What is the default administrative distance of OSPF?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()
Which statement describes the rule of split horizon?()
What is the purpose of the cisco Vlan Trunking protocol?()
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()
Which command encrypts all plaintext passwords?()
Which pairing reflects a correct protocol-and-metric relationship?()
At which layer of the OSI model is RSTP used to prevent loops?()