What do the following commands accomplish?
access-list 1 deny 172.16.4.0 0.0.0.255
access-list 1 permit any
interface ethernet 0
IP access-group 1 out
A. This will block traffic from subnet 172.16.4.0 and allow
all other
traffic.
B. This will allow traffic from subnet 172.16.4.0 and block
all other
traffic.
C. All traffic is allowed.
D. All traffic is blocked.
Answer / guest
Answer:: A
This will block traffic from subnet 172.16.4.0 and allow all
other
traffic. The first statement "access-list 1 deny 172.16.4.0
0.0.0.255"
will deny access to the subnet 172.16.4.0.
Is This Answer Correct ? | 8 Yes | 0 No |
Explain what is the size of hello packets in eigrep protocol?
Identify the 3 pieces of hardware you would not install to prevent broadcasts? A.) Switch B.) Repeater C.) Bridge D.) Router
What is the extended IPX access list range? A.) 901-1000 B.) 100-199 C.) 900-999 D.) 1000-1000
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
what is routing and routed protocol ?
Routers that have Flash memory typically have a ore loaded copy of place IOS software. Which command should you use to make a backup copy of the software image onto a given network server? A. copy flash tftp B. save copy to tftp C. write backup tftp D. write, backup -server-name- E. copy backup to -server-name-
What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router
When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.
Which OSI Reference Layer controls application to application communication? A.) Datalink B.) Network C.) Transport D.) Session E.) Physical
What is subnetting? Why is it used?
Which commands would assign and enable IPX on an interface ? A.) enable netware B.) enable novell-ether C.) router#(config)ipx routing D.) You must first enable IPX globally and then assign the network number to the interface . E.) enable ipx F.) router#(config-if)ipx network 4a
Identify 2 functions of IPX access-lists? A.) Control SAP traffic B.) Limit number of Novell servers on a network C.) Limit number of workstations on a network D.) Block IPX traffic