IP standard access lists use which of the following as a
basis for
permitting or denying packets?
A.) destination address
B.) port
C.) protocol
D.) source address
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
For Standard access lists, only the source address is used
as a basis
for permitting or denying packets.
Is This Answer Correct ? | 2 Yes | 1 No |
Answer / bhisham
ACL (Access control List) three types given below:-
Standard ACL:-ip based 1-99,1300-1399 Range
In which ACL apply closer to the Sourse Address.
Extended ACL:-Port No and ip address
and Range 100-199,2000-2099
In Which ACL apply to closer the destination port
Name Based ACL:-Similar to the Extended but used name
istead of the No.
Is This Answer Correct ? | 0 Yes | 0 No |
Tell me which protocol works only on cisco routers?
Which command listed below sets the banner message when someone connects to the router? A.) message # B.) banner # C.) login banner # D.) description # E.) login description # F.) banner motd #
What is Transport and Tunnel mode?
What are the two most common request/reply pair with ICMP messages when using the ping command? (Choose two) A. echo reply B. echo request C. source quench D. fragment onset E. information redirect F. destination reachable G. echo control message
What does the term "attenuation" mean in data communication? 1 loss of signal strength as distance increases 2 time for a signal to reach its destination 3 leakage of signals from one cable pair to another 4 strengthening of a signal by a networking device
What is the syntax to add a banner to the Cisco router? A.) motd banner # B.) banner C.) banner motd # D.) banner #
hello i am new to this, i need to know how will i complete a basic scenario that ask the required number of networks that is 80 and the minimum number of host that is 3000 and the network address is 10.0.0.0 and i need to need how to compute to get the answer on what is the subnet mask.
router
You need to come up with a TCP/IP addressing scheme for your company. How many network IDs must you allow for when you define the subnet mask for the network? A.) One for each WAN link B.) One for each router interface C.) One for each NIC installed in each client D.) One for each subnet with hosts E.) One for each host ID
what is telnet,ssh?? what is the perpose of this? wer r this configured and how to configured??
Which protocol gets a hardware address from a known IP address? A.) RARP B.) TCP C.) IP D.) BootP E.) ARP F.) ICMP
Which of the following is True regarding passwords on a Cisco router? A. All passwords can be encrypted B. All passwords can be entered using the set-up dialogue C. A password can be set before a user can enter the privileged mode D. A password can be set for individual lines E. TACACS or Radius password authentication can be used.