Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What does the following line for an access list do? 'access-list

101 deny tcp 3.4.5.0 0.0.0.255 any eq 23'

A.) deny all ftp traffic

B.) deny all ftp traffic from subnet 3.4.5.0

C.) deny all telnet traffic from subnet 3.4.5.0

D.) deny all ftp traffic to subnet 3.4.5.0

E.) deny all telnet traffic



What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0...

Answer / guest

Answer: C

Is This Answer Correct ?    5 Yes 0 No

Post New Answer

More CCNA Interview Questions

Tell me how much hold down time of eigrep protocol?

0 Answers  


What type of switching creates variable latency through the switch? A.) Cut-Through B.) Inverted C.) Layer 4 D.) Multiplexed E.) Store and Forward

1 Answers  


Which is the protocol using multiple tcp/ip connections? SLIP or PPP

2 Answers   Sutherland,


Identify the command to configure ALL the default VTY ports? A.) Router(config)# line vty 0 4 B.) Router# line vty 0 4 C.) Router(config)# line vty D.) Router(config)# line vty 0

2 Answers   Accel, CMS,


Which OSI layer defines end to end communication, segmentation and re-assembly? A.) Network B.) Transport C.) Physical D.) Application E.) Data-Link F.) Presentation

1 Answers  


For IPX, what is the DEFAULT Cisco Encapsulation on an Ethernet interface? A.) novell-ether B.) gns C.) snap D.) arpa E.) sap F.) dix

1 Answers  


The network portion of an address typically represents a: A.) Router B.) Ethernet MAC address. C.) Computer D.) Host E.) Segment

3 Answers  


What are four benefits that can result from applying ISDN networking? (Choose four) A. Full time connectivity across the ISDN is spoofed by Cisco IOS routers using dial on demand routing (DDR) B. Small Once and Home Once sites can be economically supported with ISDN Basic Rate Interface (BRI) servkps C. ISDN replaces Signaling System 7 (SS7) in the Public Switched Telephone Network (PSTIC) backbone D. ISDN can be used as a backup service for a leased line connection between the remote and central chaps E. Modem racking and cabling can be eliminated by integration of digital modem cards on Cisco IOS Network Acess Servers (NAS)

2 Answers  


Difference between Distance vector, Link state protocols

3 Answers   HCL,


why we use AS no. in IGRP and EIGRP?

2 Answers   HCL,


At what layer of the OSI reference model does FRAME-RELAY map to? A.) Session B.) Physical C.) Network D.) Presentation E.) Transport F.) Datalink

2 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

3 Answers  


Categories