what is standard and extended acess list?
what are the commands for extended and acess list?
Answers were Sorted based on User's Feedback
Answer / agen
Standard access list check only the source ip address and
it should be placed close to the destination
Extended access list checks both source,destination ip
address and it should be placed close to the source
COMMAND FOR EXTENDED ACCESS_LIST
Router(config)#access-list<no><action><protocol>
<source add><source WCM><source port no>
<destination add><destination WCM><destination port no>
Is This Answer Correct ? | 9 Yes | 0 No |
Answer / gautam mishra
standard excess list is based on the source ip address,
it can full permit or full deny
while
extended access list is based on the source and the
destination ip address and is applied through the port
nubers.
Is This Answer Correct ? | 2 Yes | 2 No |
Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface
What IP command would you use to test the entire IP stack? A.) Stack-test B.) Arp C.) Telnet D.) Ping E.) Trace
Differentiate full-duplex from half-duplex.
Which layer is responsible for identifying and establishing the availability of the intended communication partner? A.) Application B.) Presentation C.) Transport D.) Session E.) Network
Which protocol can do load balancing on unequal cost also?
What is the Difference between Switch and Bridge?
Explain the types of communication in ipv4?
Identify the purpose of the Trace command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path a packet is taking through the network D.) Transmits user data when buffers are full
Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether
What is the routing metric used by IGRP? A.) MTU, delay, bandwidth, reliability, and loading B.) Count to infinity C.) TTL D.) Hop count
What is a key use of a device hardware address? A. to obtain a vendor code / serial number from the user B. to transmit a frame from one Interface to another Interface C. to transmit a packet from one local device to another local device D. to transmit data from one local device to a remote device across the internet E. to contain logical information about the device to use for end-to-end transmission
When using access lists, what does a Cisco router check first? A. To see if the packet is routable or bridgeable B. The destination address C. The source address D. The packet contents