What should be the first command to create an access-list that
prevents all users on subnetwork 10.10.128.0, using subnet mask
255.255.192.0, from being
able to telnet anywhere?
A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq
telnet
B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq
telnet
C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq
telnet
E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq
telnet
F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq
telnet
Answers were Sorted based on User's Feedback
Answer / tahir haider
access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
C:
| Is This Answer Correct ? | 5 Yes | 1 No |
What is LSA? How many types of LSA used by OSPF version 2??
Want to be a Cisco certified person through authorized training and certification center ?
What is true about frame-relay DLCI? A.) DLCI represents a single physical circuit B.) DLCI is optional in all frame-relay networks C.) DLCI identifies a logical connection between DTE devices D.) DLCI is used to tag the beginning of a frame with VLAN information
Tell us the name of algorithm of eigrp protocol?
In stead of 0.0.0.0 wild card mask what you can write after ip?
What are the two most common transport layer protocols? UDP TCP IPX ARP
1) How a router established a neighbor relation ship in ospf
what is the default ad value of the interface directly coneted to router. as for exmaple ad value of ospf is 90 then from ehternet the network is conected whta is difault value of that directly conected interface. what is the defalt ad value of bgp whta is access llist and how many type of access list what is vlan what is vpn how e congigure the router what is mpls these are the question skrd to me at tcs i have replyed all ecxept the first one
Why do we have a Layered Model? 1) It reduces complexity 2) Allows for a standardized interface 3) Facilitates modular engineering 4) Ensures interoperable technology 5) Accelerates evolution 6) Simplifies teaching and learning
Of the following switching types, which one has the lowest latency? A.) Cut-through B.) Fragment Free C.) None D.) Store-and-forward
What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic
The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network