What should be the first command to create an access-list that

prevents all users on subnetwork 10.10.128.0, using subnet mask

255.255.192.0, from being

able to telnet anywhere?

A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq
telnet

B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq
telnet

C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet

D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq
telnet

E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq
telnet

F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq
telnet

Answers were Sorted based on User's Feedback



What should be the first command to create an access-list that prevents all users on subnetwork 1..

Answer / tahir haider

access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
C:

Is This Answer Correct ?    5 Yes 1 No

What should be the first command to create an access-list that prevents all users on subnetwork 1..

Answer / shahin

Mr Tahir, Ur answer is wrong. As of no subnet mask is used
in ACL. It use WILD CARD MASK.

So correct answer wud be A.

access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq

Is This Answer Correct ?    1 Yes 1 No

What should be the first command to create an access-list that prevents all users on subnetwork 1..

Answer / guest

Answer: A

Is This Answer Correct ?    1 Yes 3 No

Post New Answer

More CCNA Interview Questions

Identify the 2 commands the saves the running-config to NVRAM? A.) write memory B.) copy running-config startup-config C.) write network D.) write backup

2 Answers  


An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.

1 Answers  


What is the difference among straight cable, cross cable and rollover cable?

0 Answers  


Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination

3 Answers  


Which of the following are Presentation Layer standards? A.) JPEG and PICT B.) MPEG and MIDI C.) ASCII and EBCDIC D.) NFS and SQL

2 Answers  






What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS

1 Answers  


A ISDN PRI circuit can be described as which of the following? A.) 24 B channels and 1-64Kbps D channel B.) 23 B channels and 1-64Kbps D channel C.) 2-D channels and 1-C channel D.) 2-64Kbps B channels and 1-16Kbps D channel

1 Answers  


Identify the hardware component that stores the backup configuration? A.) RAM B.) NVRAM C.) Flash D.) ROM

1 Answers  


What is a L2F protocol?

1 Answers   CCIE,


Which layer is responsible for coordinating communication between systems? A.) Application B.) Network C.) Session D.) Transport E.) Physical F.) Data Link

2 Answers   HCL,


How many tables are in ospf protocol?

0 Answers  


what is the full fom of ping

17 Answers  


Categories