单项选择题
Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?()
A.
B.
C.
D.
相关考题
-
单项选择题
Given the configuration shown in the exhibit, what is the function of the protect-loopback filter?()
A. to protect the Routing Engine
B. to protect all interfaces on the device
C. to protect the Packet Forwarding Engine
D. to protect the management interface -
多项选择题
Referring to the exhibit, which two statements are true?()
A. The route 192.168.1.0/25 is accepted
B. The route 192.168.2.0/24 is accepted
C. OSPF routes will be exported into RIP
D. RIP routes will be exported into OSPF -
单项选择题
Given the configuration and routing table shown in the exhibit, which routes will be advertised to OSPF neighbors because of the demo policy?()
A. 192.168.0.0/16 only
B. 192.168.0.0/17 only
C. 192.168.0.0/16 and 192.168.0.0/17
D. 192.168.0.0/17, 192.168.50.0/24, and 192.168.51.0/24
