Identify 3 feature of access-lists?
A.) Implicit deny will deny any packets not matched
B.) Processed sequentially from bottom to top
C.) Processed sequentially from top to bottom
D.) If a packet is denied it would be tested against the
remaining
statements in the access-list
E.) Once a match is made the packet is either denied or
permitted
F.) Enabled on all interfaces by default
Answer / guest
Answer: A C E
Access-list are processed from top to bottom, once a match
occurs the
packet is either denied or permitted and is no longer tested
and if no
match occurs the packet is denied via the implicit deny.
| Is This Answer Correct ? | 3 Yes | 0 No |
Which of the following are logged when IP access list logging is enabled? A.) source address B.) protocol C.) source port D.) destination address E.) access list number F.) destination port
Identify the command to configure the router for IGRP autonomous system 100? A.) Router(config)# router igrp 100 B.) Router> router igrp 100 C.) Router# router igrp 100 D.) Router(config)# router igrp
As a system administrator, you want to debug igrp but are worried that the "debug IP igrp transaction" command will flood the console. What is the command that you should use? A. debug IP igrp event B. debug IP igrp-events C. debug IP igrp summary D. debug IP igrp events
When ip confliction accord in subnet which ip assigned automatically and what it called?
Identify 2 PPP characteristics? A.) Is proprietary to Cisco B.) Supports authentication C.) Support compression D.) Run on a multi-access network
How broadcast is created in switch
How does OSPF calculate its Metric
What is the maximum hop count for Link-State protocols? A.) 15 B.) there is no hop count limit C.) 256 D.) 16
Tell me which protocol comes under hybrid dynamic type?
An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.
Which of the following are examples of the Application Layer? A.) LLC B.) Token Ring C.) Spreadsheet D.) TCP E.) IP F.) Word Processor
what is difference between hub and switch?