What do the following statements in an extended access list
accomplish?
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0
0.0.0.255 eq 21
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0
0.0.0.255 eq 20
access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0
255.255.255.255
A. This will block ftp traffic.
B. This will block http traffic.
C. This will permit ftp traffic.
D. This will permit tftp traffic.
Answer / guest
Answer:: A
This will block ftp traffic since ftp uses ports 20 and 21.
Is This Answer Correct ? | 4 Yes | 0 No |
When you use the Cisco IOS command show configuration on a router which part of the output shows the specific conferred IP addresses and shored masks? A. the IP host table B. the interfaces output C. each section of the output D. the global configuration statements E. the section under the autonomous system number
How would you configure one host name that points to two IP addresses? A. IP host jacob 1.0.0.5 2.0.0.8 B. IP jacob 1.0.0.5 2.0.0.8 C. IP host jacob 1.0.0.5 D. IP host duplicate "all"
Explain what is the default behavior of access-list?
What is window in networking terms?
How many types of ethernet?
Which command displays the IP addresses assigned to specific host names? A. show hosts B. show interface C. ping host name D. config host name E. show host mapping F. show host ip address G. trace ip addresses host name H. a partridge in a pear tree
What 3 sources can configuration commands be placed into RAM? A.) HP Openview B.) Console C.) Vterminal D.) TFTP server E.) NVRAM
NetWare IPX addressing uses a network number and a node number. Which statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digits long. B. The node address is always administratively assigned. C. The node address is usually the MAC address. D. If the MAC address is used as the node address, then IPX eliminates the use of ARP.
Can 2 different VTP Domain Communicate. if yes then How.
How many LMI types are available on Cisco routers? A.) Four B.) Two C.) Five D.) Three
What is the difference between lan, man, and wan?
IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port