Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which statement should you use to deny FTP access (only)
from network 210 93 105 0 to network 223 8 151 0?

A. access list 1 deny 210 93 105 0 0 0 0 0 any eq ftp access
list 1 permit any

B. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151
0 0 0 0 255 eq ftp

C. access list 100 deny ip 223 8 151 0 0 0 0 255 any eq ftp
access list 100 permit hp any any

D. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151
0 0 0 0 255 eq ftp access list 100 permit ip any any



Which statement should you use to deny FTP access (only) from network 210 93 105 0 to network 223 8..

Answer / guest

Answer: D

Is This Answer Correct ?    2 Yes 2 No

Post New Answer

More CCNA Interview Questions

Identify the type of routing protocol that exchanges entire routing tables at regular intervals? A.) Link state B.) Interior gateway protocols C.) Appletalk routing D.) Distance vector

2 Answers  


What would be the proper wildcard mask to permit all odd numbered hosts on the 10.48.0.0/12 network? access-list 1 permit 10.48.0.0 0.15.255.255 access-list 1 permit 10.48.0.1 0.15.255.254 access-list 1 permit 10.48.0.0 0.15.255.1 access-list 1 permit 10.48.0.0 0.0.0.254 access-list 1 permit 10.48.0.0 0.0.0.255

5 Answers  


Name the command we use for ping in ipv6?

0 Answers  


Where is the point between the customers site and the phone carrier that responsibility changes? A.) CO B.) Demarc C.) DCE D.) DTE E.) CPE

1 Answers  


What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

1 Answers  


Which command switches from User mode to Privileged mode? A.) login B.) privilege C.) admin D.) enable E.) enter F.) root

5 Answers  


You have a Class B network address divided into 30 subnets. You will add 25 new subnets within the next year. You need 600 host IDs for each subnet. Which subnet mask should you use? A.) 255.254.0.0 B.) 255.192.0.0 C.) 255.255.252.0 D.) 255.255.248 0

1 Answers  


What is ping? What is the usage of ping?

0 Answers  


Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.) 1000 - 1099 D.) 100 - 199

1 Answers  


Identify the 2 hardware components used to manage and/or configure a router? A.) Auxiliary port B.) ROM port C.) Management port D.) Console port

3 Answers  


How are internetworks created?

0 Answers  


In order to configure a Frame Relay subinterface with IP identify the 2 commands that must be configured on the physcial interface? A.) Router(config-if)# encapsulation frame-relay B.) Router(config-if)# no ip address C.) Router(config-if)#encapsulation subinterface frame-relay D.) Router(config)# subinterface s0 encapsulation frame-relay

2 Answers  


Categories