What do the following commands accomplish?

access-list 1 deny 172.16.4.0 0.0.0.255

access-list 1 permit any

interface ethernet 0

IP access-group 1 out

A. This will block traffic from subnet 172.16.4.0 and allow
all other

traffic.

B. This will allow traffic from subnet 172.16.4.0 and block
all other

traffic.

C. All traffic is allowed.

D. All traffic is blocked.



What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list..

Answer / guest

Answer:: A

This will block traffic from subnet 172.16.4.0 and allow all
other

traffic. The first statement "access-list 1 deny 172.16.4.0
0.0.0.255"

will deny access to the subnet 172.16.4.0.

Is This Answer Correct ?    8 Yes 0 No

Post New Answer

More CCNA Interview Questions

Explain what is the size of hello packets in eigrep protocol?

0 Answers  


Identify the 3 pieces of hardware you would not install to prevent broadcasts? A.) Switch B.) Repeater C.) Bridge D.) Router

3 Answers  


What is the extended IPX access list range? A.) 901-1000 B.) 100-199 C.) 900-999 D.) 1000-1000

2 Answers  


which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?

0 Answers  


what is routing and routed protocol ?

7 Answers  






Routers that have Flash memory typically have a ore loaded copy of place IOS software. Which command should you use to make a backup copy of the software image onto a given network server? A. copy flash tftp B. save copy to tftp C. write backup tftp D. write, backup -server-name- E. copy backup to -server-name-

1 Answers  


What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router

20 Answers   IBM,


When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.

1 Answers  


Which OSI Reference Layer controls application to application communication? A.) Datalink B.) Network C.) Transport D.) Session E.) Physical

2 Answers  


What is subnetting? Why is it used?

0 Answers  


Which commands would assign and enable IPX on an interface ? A.) enable netware B.) enable novell-ether C.) router#(config)ipx routing D.) You must first enable IPX globally and then assign the network number to the interface . E.) enable ipx F.) router#(config-if)ipx network 4a

1 Answers  


Identify 2 functions of IPX access-lists? A.) Control SAP traffic B.) Limit number of Novell servers on a network C.) Limit number of workstations on a network D.) Block IPX traffic

1 Answers  


Categories