What do the following commands accomplish?
access-list 1 deny 172.16.4.0 0.0.0.255
access-list 1 permit any
interface ethernet 0
IP access-group 1 out
A. This will block traffic from subnet 172.16.4.0 and allow
all other
traffic.
B. This will allow traffic from subnet 172.16.4.0 and block
all other
traffic.
C. All traffic is allowed.
D. All traffic is blocked.
Answer / guest
Answer:: A
This will block traffic from subnet 172.16.4.0 and allow all
other
traffic. The first statement "access-list 1 deny 172.16.4.0
0.0.0.255"
will deny access to the subnet 172.16.4.0.
| Is This Answer Correct ? | 8 Yes | 0 No |
What does the acronym ARP stand for? A.) Address Resolution Phase B.) ARP Resolution Protocol C.) Address Resolution Protocol D.) Address Recall Protocol
Your PC has been configured with IP Address 192.168.3.25 and a subnet mask of 255.255.255.0. Which of the following IP Addresses is a valid default gateway address for your PC? 192.168.3.0 255.255.255.0 192.168.3.2 255.255.255.0 192.168.3.25 255.255.255.0 192.168.4.1 255.255.255.255
What is a network subnet?
'Show cdp neighbors detail' show the following 3 pieces of information? A.) Hardware platform B.) Software version C.) Same as 'show version' command D.) Up to 1 address for each protocol E.) Non-direct connected routers
As a system administrator, you need to set up one Ethernet interface on the Cisco router to allow for both sap and Novell-ether encapsulations. Which set of commands will accomplish this? A. interface ethernet 0.1 ipx encapsulation Novell-ether ipx network 9e interface ethernet 0.2 ipx network 6c B. interface ethernet 0 ipx encapsulation Novell-ether ipx network 9e interface ethernet 0 ipx encapsulation sap ipx network 6c C. interface ethernet 0.1 ipx encapsulation Novell-ether interface ethernet 0.2 ipx encapsulation sap D. interface ethernet 0.1 ipx encapsulation Novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c
Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router?
Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default
Identify command that configures 'Cisco1' as a secret password? A.) Router(config)# enable secret password Cisco1 B.) Router(config)# enable secret cisco1 C.) Router(config)# enable password Cisco1 D.) Router(config)# enable secret Cisco1
which device/card is used at the end of computer/device to connect multiple or different wire of mesh topology to a single computer/device?
1 Answers Adepto, British College, Wipro,
Based on the DR AND BDR discussion i want to put one question the question is what is the name of protocol which is responsible;e for DR and BDR selection
Which command-line keywords are valid for choosing Frame-Relay LMI types? A.) itu-t B.) dlci C.) ansi D.) rfc 1544 E.) cisco F.) q933a
Two of the protocols that can be carried in the Protocol field of an IP packet are? A. TCP B. UDP C. FTP D. TFTP