What do the following commands accomplish?

access-list 1 permit 172.16.0.0 0.0.255.255

interface ethernet 0

IP access-group 1 out

interface ethernet 1

IP access-group 1 out

A. Only traffic from the source network 172.16.0.0 will be
blocked.

B. Only traffic from the source network 172.16.0.0 will be
forwarded.

Non-172.16.0.0 network traffic is blocked.

C. Non-172.16.0.0 traffic will be forwarded.

D. All traffic will be forwarded.



What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interfa..

Answer / guest

Answer:: B

Only traffic from the source network 172.16.0.0 will be
forwarded.

Non-172.16.0.0 network traffic is blocked. The wildcard mask
0.0.255.255

tells the router to check the first 2 octets and to ignore
the last 2

octets.

Is This Answer Correct ?    6 Yes 0 No

Post New Answer

More CCNA Interview Questions

Based on the DR AND BDR discussion i want to put one question the question is what is the name of protocol which is responsible;e for DR and BDR selection

7 Answers   Patni,


Identify the command that will display the RIP routes entering and leaving the router? A.) Router(config)# debug ip rip B.) Route# debug ip rip C.) Router>debug ip rip D.) Router# debug rip routes

1 Answers  


What is hsrp?

0 Answers  


When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised

8 Answers   Wipro,


Which of the following will apply IPX sap access list 1010 for incoming traffic, assume you are at the interface configuration? A.) ipx input-sap-filter 1010 in B.) ipx input-sap-filter 1010 C.) ipx access-group 1010 in D.) ipx access-list 1010 in

1 Answers  






what is vlan and how will you configure vlan on 3650 switch and how many valn can you create on that switch

3 Answers   Aptron, Volvo,


Given the following descriptions of layers of the OSI model 1) This layer segments and reassembles data into a data stream 2) This layer manages device addressing tracks the location of devices on the network and determines the best way to move data 3) This layer provides the physical transmission of the data and handles error notification network topology and flow control. Choose the statement that lists the layers in the order described above A. physical data link network B. physical session data link C. data link network transport D. data link transport network E. transport network data link F. transport data link network

2 Answers  


what is different between cisco router and layer 3 switch

8 Answers   Cisco, LABA Nepal,


What are the different types of passwords used in securing a CISCO router?

0 Answers  


Given an IPX network with redundant paths, what command will configure load balancing? A.) ipx load-balance B.) ip maximum-paths 2 C.) ipx maximum-paths 2 D.) ipx load-share

1 Answers  


Which processes does TCP, but not UDP, use? A. Windowing B. Acknowledgements C. Source Port D. Destination Port

2 Answers   Lucent,


Given an IPX network with redundant paths, what command will configure load balancing? A.) ipx load-balance B.) ip maximum-paths 2 C.) ipx maximum-paths 2 D.) ipx load-share

2 Answers  


Categories