http://img220.imageshack.us/i/acllabc.jpg/
A corporation wants to add security to its network. The requirements are: y y y y Host C shoulb be able to use a web browser(HTTP)to access the Finance Web Server Other types of access from host C to the Finance Web Server should be blocked. All acces from hosts in the Core or local LAN to the Finance We b Server should be blocked All hosts in the Core and local LAN should be able to acces the Plublic Web Server.
You have been tasked to create and apply a numberd acces list to a single outbound interface.
no more three statements that meets these requirements . corp1(config)#access-list 100 permit tcp host (host address) host (finance web server address) eq 80 corp1(config)#access-list 100 deny ip any host (finance web server address) Corp1(config)# access-list 100 permit ip any any Corp1(config)#int fa0/1 Corp1(config-if)#ip access-group 100 out Corp1(config-if)#end Corp1#copy run start
Q.1 Which IPsec security protocol should be used when confidentiality is required? A. PSK B. AH C. MD5 D. ESPokréponse: www.isaserver.com A, B, D ... se référer.
Q.7 Which statement is true, as relates to classful or classless routing? A. Automatic summarization at classful boundries can cause problems on discontinuous subnets B. EIGRP and OSPF are classful routing protocols and summarize routes by default C. RIPv1 and OSPF are classless routing protocols D. Classful routing protocols send the subnet mask in routing updates Answer: A
Which three statements about RSTP are true?
/25 et crossover
Reponse 3
Question 11 as shown above. what is the alternative notation for the IPV6 Address B514:82C3:0000:0000:0029:EC7A:0000:EC72 a) B514:82C3:0029:EC7A:EC72 b) B514:82C3::0029:EC7A:EC72 c) B514:82C3:0029::EC7A:0000:EC72 d) 14:82C3::0029:EC7A:0:EC72 NONE OF THESE ARE RIGHT! Am I missing something?! @Adeel Khan, how can your answer be right when the 2nd to last group of hex