IP standard access lists use which of the following as a
basis for
permitting or denying packets?
A.) destination address
B.) port
C.) protocol
D.) source address
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
For Standard access lists, only the source address is used
as a basis
for permitting or denying packets.
| Is This Answer Correct ? | 2 Yes | 1 No |
Answer / bhisham
ACL (Access control List) three types given below:-
Standard ACL:-ip based 1-99,1300-1399 Range
In which ACL apply closer to the Sourse Address.
Extended ACL:-Port No and ip address
and Range 100-199,2000-2099
In Which ACL apply to closer the destination port
Name Based ACL:-Similar to the Extended but used name
istead of the No.
| Is This Answer Correct ? | 0 Yes | 0 No |
What is the Difference between Hub and Switch?
Which protocol will let neighbor routers know if your internetwork experienced congestion on a serial port? A.) BootP B.) IP C.) ICMP D.) ARP E.) FTP F.) RARP
Identify command that configures 'Cisco1' as a secret password? A.) Router(config)# enable secret password Cisco1 B.) Router(config)# enable secret cisco1 C.) Router(config)# enable password Cisco1 D.) Router(config)# enable secret Cisco1
Identify the 2 characteristics regarding MAC addresses? A.) Contains a network portion and host portion B.) Always assigned by System Administrator C.) 48 bits long D.) Contains a vendor code and serial number
Of the following switching types, which one has the highest latency? A.) Cut-through B.) None C.) Store-and-forward D.) Fragment Free
Explain why UDP is lease favored when compared to TCP?
Which of the following are examples of the Datalink Layer? A.) LLC B.) SQL C.) TCP D.) Token Ring E.) IP
What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic D.) Distance Vector
What is the protocol number for UDP? A.) 6 B.) 17 C.) 25 D.) 21
Utilizing RIP, what is the limit when it comes to the number of hops?
Which of the following will show an extended access list 150? A.) sh access-list 150 B.) sh ip int C.) sh ip access-list D.) sh access-list 150 extended
Identify the OSI layer responsible for end-to-end connections? A.) Network B.) Transport C.) Session D.) Data link E.) TCP