Access lists are numbered. Which of the following ranges
could be
used for an IP access list?
A. 600 - 699
B. 100 - 199
C. 1 - 99
D. 800 - 899
E. 1000 - 1099
Answer / guest
Answer:wer: B & C
AppleTalk access lists use numbers in the 600 - 699 range.
IP uses 1 -
99 for standard access lists or 100-199 for extended access
lists. IPX
uses 800 - 899 or 900 - 999 for extended access lists. IPX
SAP filters
use 1000 - 1099.
| Is This Answer Correct ? | 3 Yes | 0 No |
Differentiate between broadcast domain and collision domain
CSMA/CD stand for which of the following? A.) Carrier Sense, Multiple Access with Collision Detection B.) Collision Sense, Multiple Access with Collision Detection C.) Collision Sense, Multiple Access with Carrier Detection D.) Carrier Sense, MAC address with Collision Detection
what is 5-4-3 rule?
What 2 commands verify end to end communications? A.) Trace B.) debug ip session C.) Ping D.) Route
What is a disadvantage of using a connection oriented protocal such as TCP? A. Packet acknowledgement may add overhead B. packets are not tagged with sequence numbers C. Loss or duplication of data packets is more likely to occur D. The application layer must assume responsibility for correct searchers of the data packets
Which two commands show your access lists? (Choose two) A. show filters B. show access-lists C. show ip access-lists D. show running-config
In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this? A.) Defining a Maximum. B.) You can not solve the 'count to infinity' problem with a distance vector protocol. C.) Poison Reverse. D.) Triggered Updates. E.) Split Horizon.
Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable
When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes
Which two types of route table entries are used by a Layer 3 router to determine the appropriate path to destination? (Choose two) A. static route entry B. default route entry C. Dynamic route entry D. temporary route entry E. permanent route entry
IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address
Which of the following are Transport layer protocols? A.) UDP B.) TCP C.) NBP D.) IP E.) SPX