Write an access list line which will deny
node 20.0.2.1 to anywhere on your network using
DNS via UDP. Don't worry about the other access
list lines.

Answers were Sorted based on User's Feedback



Write an access list line which will deny node 20.0.2.1 to anywhere on your network using DNS via ..

Answer / rohit sunkara

hey u made a silly mistake.the statement goes like

1 to 99 is used for standard which cannot be used to filter
protocol

any you have to deny it,not accept it


access list 110 deny udp host 20.0.2.1 any eq 53

Is This Answer Correct ?    5 Yes 0 No

Write an access list line which will deny node 20.0.2.1 to anywhere on your network using DNS via ..

Answer / shahin

access list 10 permit udp host 20.0.2.1 any eq 53

Is This Answer Correct ?    3 Yes 5 No

Post New Answer

More CCNA Interview Questions

What is the mac address?

0 Answers  


ok this is practical senario question how can we comunicate two diffrent network host by i single 1603 sires of cisco router rember that the cisco series of that router have singe 100mbps ethernet now think think write all command answer is so simple i wiil; give the answer after 20 visit til then wait

2 Answers  


What key do you use to view the last command? A.) Ctrl+X B.) Ctrl+Z C.) Ctrl+E D.) Ctrl+P

1 Answers  


What is osi?

0 Answers  


Which OSI layer incorporates the MAC address and the LLC? A.) Data link B.) Network C.) Physcial D.) Transport

4 Answers  






CSMA/CD stand for which of the following? A.) Carrier Sense, Multiple Access with Collision Detection B.) Collision Sense, Multiple Access with Collision Detection C.) Collision Sense, Multiple Access with Carrier Detection D.) Carrier Sense, MAC address with Collision Detection

1 Answers  


What is the command to copy the IOS image to a TFTP server? A.) copy flash tftp B.) copy running-config tftp C.) copy ios tftp D.) copy startup-config tftp

2 Answers  


In IPSec what is SAD, SPD and SA's?

0 Answers   CCIE,


How many types of memories are used in cisco router?

0 Answers  


Identify the purpose of the TCP 3 step handshake? A.) Setup a un-reliable connection B.) Initialize routing tables C.) Synchronize sequence numbers between hosts D.) Connection tear down process

1 Answers  


What is the difference between tracert and traceroute?

0 Answers  


What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interface ethernet 0 IP access-group 1 out interface ethernet 1 IP access-group 1 out A. Only traffic from the source network 172.16.0.0 will be blocked. B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. C. Non-172.16.0.0 traffic will be forwarded. D. All traffic will be forwarded.

1 Answers  


Categories