Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What do the following statements in an extended access list

accomplish?

access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0
0.0.0.255 eq 21

access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0
0.0.0.255 eq 20

access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0
255.255.255.255

A. This will block ftp traffic.

B. This will block http traffic.

C. This will permit ftp traffic.

D. This will permit tftp traffic.



What do the following statements in an extended access list accomplish? access-list 101 deny T..

Answer / guest

Answer:: A

This will block ftp traffic since ftp uses ports 20 and 21.

Is This Answer Correct ?    4 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is the difference between full duplex and half duplex?

0 Answers  


What are the difference between IPv4 & IPv6?? Can anyone explain more details about it..!!

9 Answers   HCL,


What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer

1 Answers  


What is the ieee standard for wireless networking?

0 Answers  


Which of the following is a layer 2 device? A.) Switch B.) Router C.) Repeater D.) Hub

4 Answers  


What is the utility of ping?

0 Answers  


When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.

1 Answers  


Why is network segmentation a good idea when managing a large network?

0 Answers  


What does the User Datagram Protocol (UDP) provide? A.) Connectionless datagram service. B.) FECN & BECN C.) Flow control and error checking. D.) Name resolution. E.) Path discovery.

1 Answers  


The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments

1 Answers  


Which OSI Reference Layer controls end-to-end (host to host) communication? A.) Transport B.) Physical C.) Datalink D.) Network E.) Session

1 Answers  


Identify the 2 commands that copies the configuration in NVRAM to RAM? A.) copy backup-config running-config B.) configure nvram C.) copy startup-config running-config D.) configure memory

3 Answers  


Categories