Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


An optional parameter on an IPX access is the 'LOG' parameter.

This records access-list violations when a packet matches.
What else

does the 'LOG' option do?

A.) Records the number of times that a packet matches the list.

B.) Return a message to user who is denied access the by list.

C.) Notifies an SNMP Agent.

D.) Saves the log to NVRAM.

E.) Send an SNMP Trap.



An optional parameter on an IPX access is the 'LOG' parameter. This records access-list..

Answer / guest

Answer: A

It will record to the log. By default a Cisco router logs to
RAM and can

display the offense to the console, which is not
recommended. It is

suggested that you log to a syslog server, for less router
CPU impact.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Can you explain tunneling?

0 Answers   CCIE,


What is the distance limitation for 100BaseT? A. 305.955 ft B. 7283.46 inches C. 184 Meters D. 185 Kilometers

3 Answers  


Which table find best path?

0 Answers  


What is the function of the Transport layer and which protocols reside there? A.) MAC addressing - IP B.) Interhost communication - SQL, NFS C.) Best effort Packet delivery - TCP, UDP D.) End-to-end connections - TCP, UDP

1 Answers  


Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) They are identical C.) They both require the enable password D.) User exec is a subset of the privileged exec

1 Answers  


If you are in IOS user mode, which command do you use to enter the privileged mode? A. Set B. Enable C. Configure D. Privileges

2 Answers  


Which of the following are logged when IP access list logging is enabled? A.) source address B.) protocol C.) source port D.) destination address E.) access list number F.) destination port

1 Answers  


hello friend i have answerd more time of your question or doute.now i am seeing towards you for help,plz send the soln before monedya the problem is i have three router r1 and r2 and r3 they are conested in that maneer thai is r1---r2---r3---server | | server bothe server have diffrent ip now i have to implemnt access list on the r3 router in such a way that user from r1 can access only one server while user from r2 can access whole servre i ahve done it but both user of r1 and r2 uses all server i need help please help me this time? i have repalsced my firwall by r3 router so bacicaly i have to implement it on my firewall but you tell me on cisco router please help

2 Answers  


Which of the following is an example of the Datalink Layer? A.) LLC B.) TCP C.) SQL D.) IPX E.) Token Ring F.) MAC

2 Answers  


what is difference between subnet-mask and wildcard mask?

6 Answers   IBM,


Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II

2 Answers  


Which of the following is an example of the Network Layer? A.) TCP B.) IP C.) SQL D.) Token Ring E.) LLC

2 Answers  


Categories