Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.Which firewall filter configuration do you use?()
A. B. C. D.
单项选择题Given the configuration shown in the exhibit, what is the function of the protect-loopback filter?()
A. to protect the Routing Engine B. to protect all interfaces on the device C. to protect the Packet Forwarding Engine D. to protect the management interface
多项选择题Referring to the exhibit, which two statements are true?()
A. The route 192.168.1.0/25 is accepted B. The route 192.168.2.0/24 is accepted C. OSPF routes will be exported into RIP D. RIP routes will be exported into OSPF
单项选择题Given the configuration and routing table shown in the exhibit, which routes will be advertised to OSPF neighbors because of the demo policy?()
A. 192.168.0.0/16 only B. 192.168.0.0/17 only C. 192.168.0.0/16 and 192.168.0.0/17 D. 192.168.0.0/17, 192.168.50.0/24, and 192.168.51.0/24
单项选择题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()
A. The traffic will be rejected. B. The traffic will be dropped. C. The traffic will be forwarded. D. The traffic will be policed.
A. 192.168.0.0/16 only B. 192.168.50.0/24 only C. 192.168.50.0/24 and 192.168.51.0/24 D. 192.168.0.0/17, 192.168.50.0/24, and 192.168.51.0/24