What do the following statements in an extended access list
accomplish?
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0
0.0.0.255 eq 21
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0
0.0.0.255 eq 20
access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0
255.255.255.255
A. This will block ftp traffic.
B. This will block http traffic.
C. This will permit ftp traffic.
D. This will permit tftp traffic.
Answer / guest
Answer:: A
This will block ftp traffic since ftp uses ports 20 and 21.
| Is This Answer Correct ? | 4 Yes | 0 No |
What is the difference between full duplex and half duplex?
What are the difference between IPv4 & IPv6?? Can anyone explain more details about it..!!
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
What is the ieee standard for wireless networking?
Which of the following is a layer 2 device? A.) Switch B.) Router C.) Repeater D.) Hub
What is the utility of ping?
When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.
Why is network segmentation a good idea when managing a large network?
What does the User Datagram Protocol (UDP) provide? A.) Connectionless datagram service. B.) FECN & BECN C.) Flow control and error checking. D.) Name resolution. E.) Path discovery.
The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments
Which OSI Reference Layer controls end-to-end (host to host) communication? A.) Transport B.) Physical C.) Datalink D.) Network E.) Session
Identify the 2 commands that copies the configuration in NVRAM to RAM? A.) copy backup-config running-config B.) configure nvram C.) copy startup-config running-config D.) configure memory