Which Standard IP Access list commands will deny only the source
address 1.1.1.1?
A.) access-list 9 deny host 1.1.1.1
B.) access-list 9 deny 1.1.1.1 255.255.255.0
C.) access-list 9 deny 1.1.1.1 0.0.0.0
D.) access-list 9 deny 1.1.1.1 0.255.255.255
E.) access-list 9 deny 1.1.1.1 255.255.255.255
Answers were Sorted based on User's Feedback
Answer / prasanna
D
is the ryt answer
when we applying acl the host address must be reversed
| Is This Answer Correct ? | 0 Yes | 0 No |
Which three pieces of CDP information about neighbours routers are displayed on your console terminal? (Choose three) A. neighbours router a host name B. the neighbours router a hardware platform C. up to one address for each protocol supported D. up to two addresses for each protocol supported
2. What are the valid ways to segment a LAN? (Choose all that apply) A. Repeater B. Bridge C. Switch D. Router
What are the differnt memory use in cisco router?
as we know that isdn bri port come with either a u interface or some thing s/t interface what is the diffrenmce between them
Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, that network is advertised with an infinite metric
What are 3 ways to provide login access to router? A.) Console B.) TFTP C.) Rlogin D.) Auxiliary Port E.) X Windows F.) Telnet
What are the different memories that are used in a cisco router?
What does CCNA stand for? A. Cisco Certified Network Administrator B. Cisco Certified Network Associate C. Certified Circuitry in Networking Apprentice D. Calico Cats of North America
Identify 3 characteristics of switches? A.) Increase available bandwidth B.) Decrease broadcast traffic C.) Support full duplex in a multipoint topology D.) Make forwarding decision using MAC address E.) Create collision domains
Can you explain the broader steps of how L2F establishes the tunnel?
What is the difference between static ip addressing and dynamic ip addressing?
Explain protocol?