Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Access lists are numbered. Which of the following ranges
could be

used for an IP access list?

A. 600 - 699

B. 100 - 199

C. 1 - 99

D. 800 - 899

E. 1000 - 1099



Access lists are numbered. Which of the following ranges could be used for an IP access list? ..

Answer / guest

Answer:wer: B & C

AppleTalk access lists use numbers in the 600 - 699 range.
IP uses 1 -

99 for standard access lists or 100-199 for extended access
lists. IPX

uses 800 - 899 or 900 - 999 for extended access lists. IPX
SAP filters

use 1000 - 1099.

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More CCNA Interview Questions

Differentiate between broadcast domain and collision domain

0 Answers  


CSMA/CD stand for which of the following? A.) Carrier Sense, Multiple Access with Collision Detection B.) Collision Sense, Multiple Access with Collision Detection C.) Collision Sense, Multiple Access with Carrier Detection D.) Carrier Sense, MAC address with Collision Detection

1 Answers  


what is 5-4-3 rule?

2 Answers  


What 2 commands verify end to end communications? A.) Trace B.) debug ip session C.) Ping D.) Route

2 Answers  


What is a disadvantage of using a connection oriented protocal such as TCP? A. Packet acknowledgement may add overhead B. packets are not tagged with sequence numbers C. Loss or duplication of data packets is more likely to occur D. The application layer must assume responsibility for correct searchers of the data packets

1 Answers  


Which two commands show your access lists? (Choose two) A. show filters B. show access-lists C. show ip access-lists D. show running-config

2 Answers  


In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this? A.) Defining a Maximum. B.) You can not solve the 'count to infinity' problem with a distance vector protocol. C.) Poison Reverse. D.) Triggered Updates. E.) Split Horizon.

2 Answers  


Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable

1 Answers  


When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes

1 Answers  


Which two types of route table entries are used by a Layer 3 router to determine the appropriate path to destination? (Choose two) A. static route entry B. default route entry C. Dynamic route entry D. temporary route entry E. permanent route entry

2 Answers  


IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address

1 Answers  


Which of the following are Transport layer protocols? A.) UDP B.) TCP C.) NBP D.) IP E.) SPX

3 Answers  


Categories