What should be the first command to create an access-list that
prevents all users on subnetwork 10.10.128.0, using subnet mask
255.255.192.0, from being able to telnet anywhere?
A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq
telnet
B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq
telnet
C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq
telnet
E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq
telnet
F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq
telnet
Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session
Differentiate between broadcast domain and collision domain
Based upon the exhibit, create a static route to 172.16.10.0 on Router A A.) Router# ip route 172.16.10.0 255.255.255.0 10.1.0.2 B.) Router(config)# ip static route 172.16.10.0 255.255.255.0 10.1.0.2 C.) Router(config)# ip route 172.16.10.0 10.1.0.2 D.) Router(config)# ip route 172.16.10.0 255.255.255.0 10.1.0.2
When you mistakenly type the wrong command at the Router# prompt the router does a DNS lookup which takes about 20 seconds. Which command can you enter to prevent the router doing this in future?
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list
How to see the running-config & startup-config infor from global configuration mode. As we know, from priviledge mode we cn see it by executing command. i.e. Router#show running-config and Router#show startup-config Now wat is the coommands use in global configuration mode o see those info. Router(Config)# ??????
What is a backoff on an 802.3 networks A. It is latency in store and forward switching B. It is the time used for token passing from machine to machine C. It is the retransmission delay that is enforced when a collision occurs D. it is the result of two nodes transmitting at the same time. The frames from each transmitting device collide and are damaged.
Identify the effect of Ctrl-Z? A.) Exits back to privileged exec mode B.) Disconnect from the router C.) Abort the ping operation D.) Exits privileged exec mode
Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame? A.) Fragment-free B.) Store and Forward C.) Cut-through D.) Fast forward
Which two commands show your access lists? (Choose two) A. show filters B. show access-lists C. show ip access-lists D. show running-config
Can you describe the Authentication Header (AH) Protocol?
Which port numbers are used by TCP and UDP to set up sessions with other hosts? A.) 1024 and above B.) 6 and 17 respectively C.) 1-25 D.) 6-17