are mandatory
specify action group ExecuteCommandActionGroup for Controller commands
specify action group ViewCommandActionGroup for View commands
specify resource group ControllerCommandResourceGroup for Controller commands
specify resource group ViewCommandResourceGroup for View commands
第1题:
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255
B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255
C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255
D.access-list 10 permit ip 192.168.146.0 0.0.1.255
E.access-list 10 permit ip 192.168.148.0 0.0.1.255
F.access-list 10 permit ip 192.168.146.0 255.255.255.0
第2题:
What is the key objective of the plan phase?()
第3题:
Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles.Which role mapping ruleset would result in the correct access privileges being assigned?()
A. username="*" -> Employee-role Stop username="con-*" -> Contractor-role
B. username="*" -> Employee-role username="con-*" -> Contractor-role Stop
C. username="con-*" -> Contractor-role Stop username="*" -> Employee-role
D. username="con-*" -> Contractor-role username="*" -> Employee-role Stop
第4题:
Which of the following topology situations would be a qood candidate for configuring DMVPN()
第5题:
A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()
第6题:
Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()
第7题:
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
第8题:
An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()
A. WMI
B. RIS
C. DNS
D. SNMP
E. SMTP
第9题:
The Company security administrator wants to prevent VLAN hopping on the network. What is one method that can be used to do this? ()
第10题:
An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()