What is difference between standard and extended access-list
Answers were Sorted based on User's Feedback
Answer / nazam ansari
how can i edit the existing access-list without removing it
frm the router's configuration ?
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / ajay kumar
in standard access list all decision are make on source
address and extended list work on five parameter source ip,
destination ip, source port, destination port, and
protocols.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / kush kumar singh
in thestandard acl make rules close to destination and in
the exetended acl make the rules in close to source.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / diwakar
I have a doubt if extended access list applied near to
destination interface what would happen?
| Is This Answer Correct ? | 6 Yes | 6 No |
Answer / kirri
excelent explanations ¡¡¡ tks guys my doubts are clear
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / patrick lyons
a standard ACL allows you to just eat pussy where an
extended acl lets you get your dick sucked back
| Is This Answer Correct ? | 4 Yes | 7 No |
What does the meaning of <cr >?
Can you explain transport and tunnel mode in detail with datagram packets?
what are the 3ree way for implementing vlan on cisco switches what is the layer hierarchy of the cisco what is the best place of implementing standard access list what is q stand for isdn these are the challanging question for me i am waiting for jitendera sinha answer(it is challenge for u i have seen lots of answer given by u )it is a challenge in the frendshipmode plz donot take other wise
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with 5 hosts per subnet. What subnet mask will you use? A. 255.255.255.248 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.240
By default, Cisco routers forward GNS SAPs to remote networks. A. False B. True
What does -1 signify in an extended IPX access list? A. permit this host B. deny this host C. permit only this subnet D. any host or any network
Bridges work at what layer of the OSI model? A.) Data Link B.) Network C.) Physical D.) Application
12 Answers KVS, PGT,
At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance
12 Answers EF, IBM, jetking, Nexlinx, Rkd, TCS, Wipro,
Identify the definition of demarcation? A.) Date in which the WAN service contract expires B.) Cabling which extends from the WAN service provider to the customer C.) Division of responsibility, where the CPE ends and the local loop begins D.) Equipment which is located at the customer premises
what is the main features of link state routing protocols?
Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session