Write an access list line which will deny
node 20.0.2.1 to anywhere on your network using
DNS via UDP. Don't worry about the other access
list lines.
Answers were Sorted based on User's Feedback
Answer / rohit sunkara
hey u made a silly mistake.the statement goes like
1 to 99 is used for standard which cannot be used to filter
protocol
any you have to deny it,not accept it
access list 110 deny udp host 20.0.2.1 any eq 53
| Is This Answer Correct ? | 5 Yes | 0 No |
Identify the command to configure a description on an interface? A.) Router> description Finance department B.) Router(config)# description Finance department C.) Router(config-if)# description Finance department D.) Router# description Finance department
Define mac address?
Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts
Which of the following are Transport layer protocols? A.) UDP B.) TCP C.) NBP D.) IP E.) SPX
Which OSI layer provides mechanical, electrical & procedural specifications for activating, maintaining physical link? A.) Presentation B.) Network C.) Application D.) Physical E.) Transport F.) Data-Link
Mention what is the difference between the switch, hub, and router?
Which command will display the IPX routing table? A.) show routes B.) show routes ipx C.) show routes protocol=ipx D.) show ipx E.) show ipx route
Which configuration task must you complete if a remote Frame Relay router does NOT support Inverse APP? A.configure static maps B.define an IP address locally C.disable DHCP on the Frame Relay router D.configure a static route to the remote network
Which of the following is a valid extended IP access-list? A.) router(config)# access-list 101 permit tcp host 172.16.30.0 any eq 21 log B.) router# access-list 101 permit tcp host 172.16.30.0 any eq 21 log C.) router(config)# access-list 101 permit any any 172.16.30.0 D.) router(config)# access-list 101 permit ip host 172.16.30.0 any eq 21 log
What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.
Explain the difference between collision domain and broadcast domain.
Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, that network is advertised with an infinite metric