Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What do the following commands accomplish?

access-list 1 deny 172.16.4.0 0.0.0.255

access-list 1 permit any

interface ethernet 0

IP access-group 1 out

A. This will block traffic from subnet 172.16.4.0 and allow
all other

traffic.

B. This will allow traffic from subnet 172.16.4.0 and block
all other

traffic.

C. All traffic is allowed.

D. All traffic is blocked.



What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list..

Answer / guest

Answer:: A

This will block traffic from subnet 172.16.4.0 and allow all
other

traffic. The first statement "access-list 1 deny 172.16.4.0
0.0.0.255"

will deny access to the subnet 172.16.4.0.

Is This Answer Correct ?    8 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not at the same time

2 Answers  


What are the different types of the password used in securing a cisco router?

0 Answers  


Cisco's implementation of ISDN BRI has multi protocol support, SNMP MIB support, and what other features? A.) Call waiting B.) Compression C.) ADSL D.) 1.544 Mbps E.) Call screening F.) Negative 'G' support

1 Answers  


What are the different types of VPN?

0 Answers   CCIE,


Which three basic switch functions increase available bandwidth on the networks? (Choose three) A. loop avoidance B. address learning C. hop count limiting D. broadcast filtering E. packet forward/filtering F. broadcast packet hop count learning/forward/filtering

1 Answers  


Tell me when we use extended access-list?

0 Answers  


What is subnetting? Why is it used?

0 Answers  


The Datalink Layer is broken down into 2 layers, LLC and MAC. The LLC establishes media independence and what else? A.) Provides Windowing. B.) Provides flow control. C.) Provides SAP's (Service Access Points). D.) The Datalink layer does not have sublayers. E.) Provides SAP's (Service Advertising Protocol). F.) RIP Updates.

2 Answers  


Which IP Address Class is INCORRECTLY paired with its range of network numbers? A. Class A addresses include 192.0.0.0 through 223.255.255.0 B. Class A addresses include 1.0.0.0 through 126.0.0.0 C. Class B addresses include 128.0.0.0 through 191.255.0.0 D. Class C addresses include 192.0.0.0 through 223.255.255.0 E. Class D addresses include 224.0.0.0 through 239.255.255.0

4 Answers  


What is ISR or NonISR router? Difference between ISR or NonISR router?

3 Answers   HCL,


Routers can learn about destinations through static routes, default, or dynamic routing. By default, a router will use information derived from __________. A. IGRP B. RIP C. IP D. TCP

2 Answers   pspl,


Suppose a USER is saying he is not able to access the internet or page loading is slow what trobleshooting steps you will take to get it fixed

5 Answers   Infosys,


Categories