Identify the access-list range for an extended IP access-list?
A.) 800 - 899
B.) 1 - 99
C.) 1000 - 1099
D.) 100 - 199
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
IP extended access-lists use the number range of 100-199.
| Is This Answer Correct ? | 5 Yes | 0 No |
Answer / naresh
Identify the access-list range for an extended IP access-
list?
A.) 800 - 899
B.) 1 - 99
C.) 1000 - 1099
D.) 100 - 199
Answer= D.) 100 - 199
| Is This Answer Correct ? | 3 Yes | 2 No |
Which OSI layer establishes, maintains and terminates sessions between hosts? A.) Application B.) Physical C.) Data-Link D.) Presentation E.) Network F.) Session
Which command would show all Ethernet interfaces with IPX configured on them? A.) show interface ipx ethernet B.) show ipx interface C.) show ipx interface ethernet D.) show ipx E.) show version F.) show run
A ISDN PRI circuit can be described as which of the following? A.) 24 B channels and 1-64Kbps D channel B.) 23 B channels and 1-64Kbps D channel C.) 2-D channels and 1-C channel D.) 2-64Kbps B channels and 1-16Kbps D channel
A server is running HTTP, SMTP and DHCP. Which of the following best explains how the server is able to handle all three services over the same connection? The server has separate buffer areas for each application and forwards all data to each service. If the data does not apply to that application, it is discarded. The server processes each packet one at a time and forwards the data to the application that indicates that it is waiting for a transmission to arrive. The data is discarded if it does not apply to that application. The server uses the destination port number in the TCP/UDP header to identify the service. The data is forwarded to the service identified by the port number. The server uses separate three-way handshake connections to control the flow of the data and relates the service to the proper connection. This relationship allows the server to pass the data to the proper service.
Which command will copy the routers configuration from NVRAM to a Network file server? A.) copy start tftp B.) copy start tftp server C.) copy tftp startup-config D.) copy running-config tftp E.) copy startup-config tftp
How can you add the 192.168.100.0/30 network to EIGRP without involving the 192.168.100.4/30 network as well?
What is trigger rip and from which ios version it starts?
Identify the purpose of ICMP? A.) Avoiding routing loops B.) Send error and control messages C.) Transporting routing updates D.) Collision detection
How many types of data?
When setting up a WAN network, everything outside of the Demarc is not owned by the customer. Which of the following are not owned by the customer? A.) The T1 line. B.) LAN C.) The Router D.) DTE E.) PC's F.) CO
What is the difference between static and dynamic ip addressing?
You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with 5 hosts per subnet. What subnet mask will you use? A. 255.255.255.248 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.240