Which of the following will show an extended access list 150?

A.) sh access-list 150

B.) sh ip int

C.) sh ip access-list

D.) sh access-list 150 extended

Answers were Sorted based on User's Feedback



Which of the following will show an extended access list 150? A.) sh access-list 150 B.) sh ip..

Answer / guest

Answer: A C

Is This Answer Correct ?    3 Yes 2 No

Which of the following will show an extended access list 150? A.) sh access-list 150 B.) sh ip..

Answer / lakshmi

a

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI

1 Answers  


HOW MPLS IS DIFFERENT FROM OSPF? WHY NOW A DAYS MPLS IS PREFERED OVER ANY NETWORK PROTOCOL?

1 Answers   Bank Of India, TCS,


You want to enable both arpa and snap encapsulation on one router interface. How do you do this? A. The interface can handle multiple encapsulation types with no extra configuration. B. Assign two network numbers, one for each encapsulation type. C. Enable Novell-ether to run multiple encapsulation types. D. Both arpa and snap are enabled by default so you don't have to configure anything.

2 Answers  


Identify the command mode necessary to enter the extended ping command? A.) Router# B.) Router> C.) Router(config)# D.) Router(ext-ping)#

1 Answers  


What is Route Poisoning?

0 Answers  






What is CIDR?

6 Answers   Wipro,


Explain what is the default behavior of access-list?

0 Answers  


Identify the length of an IPX address and it's components? A.) 80 bits, 48 bits network and 32 bits node B.) 32 bits, 16 bits network and 16 bits node C.) None of the above D.) 80 bits, 32 bits network and 48 bits node

1 Answers  


hi shain i have got some virus who make the .exe file that is duplicate of original file on my server 2007 windows can u suggest me any anti virus help help please help

4 Answers  


Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address

1 Answers  


What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops

1 Answers  


what is hop count?

21 Answers   IBM, PalmChip,


Categories