What does the parameter -- LOG -- do on an IPX access list?
A.) The log keyword is not a valid option.
B.) Read the LOG to figure out what traffic to deny.
C.) Logs the creation of the access list.
D.) Logs IPX access control list violations whenever a
packet matches a
particular access list entry.
E.) Ensures the IPX protocol places a log in the fireplace.
Answer / guest
Answer: D
Router(config)#access-list 900 deny any ?
log Log matches against this entry
Is This Answer Correct ? | 0 Yes | 0 No |
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
What is the most common layer 2 device? A. Hub B. Router C. Switch D. Repeater
Explain why is udp lease favored when compared to tcp?
Which of the following are examples of the Transport Layer? A.) Token Ring B.) UDP C.) TCP D.) IP E.) SQL F.) LLC
What is the Broadcast IP Address?
Identify the command to display all the valid commands at the given mode? A.) Help all B.) Help C.) All commands D.) ?
Identify the prompt displayed if in privileged exec mode? A.) Router(config)# B.) Router# C.) Router> D.) Router(priv)#
What are the advantages of a layered model in the networking industry?
Explain the difference between named and extended acl?
A routing table contains static, RIP, and EIGRP routes for the same destination network. Which route would normally be used to forward data?
What is refresher?
What is subnet? Why is it used?