What do the following commands accomplish?
access-list 1 deny 172.16.4.0 0.0.0.255
access-list 1 permit any
interface ethernet 0
IP access-group 1 out
A. This will block traffic from subnet 172.16.4.0 and allow
all other
traffic.
B. This will allow traffic from subnet 172.16.4.0 and block
all other
traffic.
C. All traffic is allowed.
D. All traffic is blocked.
Answer / guest
Answer:: A
This will block traffic from subnet 172.16.4.0 and allow all
other
traffic. The first statement "access-list 1 deny 172.16.4.0
0.0.0.255"
will deny access to the subnet 172.16.4.0.
| Is This Answer Correct ? | 8 Yes | 0 No |
What is the difference between csma/ca?
Which address or number is used to pass the data to the correct application? MAC Number IP address Port Number Segment Number
What is the function of DDR on Cisco routers? A. DDR is dial--on-demand routing. It provides a continuous LAN only connection. B. DDR is dial-on-demand routing. It provides routing for high volume traffic. C. DDR is dial--on-demand routing. It provides a continuous WAN connection. D. DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic.
Can you define in short what VPN is?
Difference between Distance vector, Link state protocols
Your Ethernet interface currently has the IP address of 1.1.1.1/24. You would like it to have a second IP address of 2.2.2.2/24. Which command will do that? A.) ip address 1.1.1.1 2.2.2.2 255.255.255.0 B.) ip address 2.2.2.2 255.255.255.0 secondary C.) ip address 2.2.2.2 255.255.255.0 D.) This cannot be done, you can only have 1 IP address per physical interface. E.) ip address 2.2.2.2 /24
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
what is bgp, and what its attributes (thanks to sahin he sende me notes) Please try to give answer it will help you in future. after giving the answer most of them i am selected foro\ 2nd round of interview thanks
What is the IEEE specification for Spanning Tree Protocol? A.) 802.9 B.) 803.ud C.) 803 D.) 802.1d
How do you find valid hosts in a subnet?
what is a routing ?what is the use of routing?
8 Answers Google, IBM, Pacific, Tata Technologies,
How would you configure one host name that points to two IP addresses? A. IP host jacob 1.0.0.5 2.0.0.8 B. IP jacob 1.0.0.5 2.0.0.8 C. IP host jacob 1.0.0.5 D. IP host duplicate "all"