Write an access list line which will deny
node 20.0.2.1 to anywhere on your network using
DNS via UDP. Don't worry about the other access
list lines.
Answers were Sorted based on User's Feedback
Answer / rohit sunkara
hey u made a silly mistake.the statement goes like
1 to 99 is used for standard which cannot be used to filter
protocol
any you have to deny it,not accept it
access list 110 deny udp host 20.0.2.1 any eq 53
| Is This Answer Correct ? | 5 Yes | 0 No |
Which statement is true regarding half duplex? A.) Only works in a point-to-point configuration B.) Allows for transmitting and receiving but not a the same time C.) Allow for transmitting and receiving of data simultaneously D.) Doubles the bandwidth
what is a routing ?what is the use of routing?
8 Answers Google, IBM, Pacific, Tata Technologies,
the term which used for describe physical alyout of network mine answer-topology
Which statement about half duplex Ethernet operations is true? A. With half duplex transmission frames feed into a single cable in one direction at a time. B. Half duplex transmission between stations is achieved by using point to point Ethernet and Fast Ethernet connections C. Half duplex transmission between stations is achieved by using point to munificent Ethernet and Fast Ethernet connections D. Half duplex Ethernet technology provides a transmit circuit connection wired directly to the receiver circuit at the other end of the connection
What must you do to test connectivity on a dial on demand routing (DDR) link? A. increase the idle Import parameter B. send interesting traffic across the link C. reboot one of the integrated services digital network (ISDN) routers D. reset the DDR integrated services digital network (ISDN) router statistics to zero
LMI operates between the Frame Switch and what other device? A.) CPE device B.) Another Frame Switch C.) X.25 switch D.) Novell File Server
In port based access-list which command u give instead of ip?
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
What is difference between igp and eigrp?
WHY DO WE USE the command interface Vlan 1 ip adress x.x.x.x sub mask what does it do .. what does it create.. i know when we create it we can remotely telnet inti a router=switch. but what is the diff bwt vlan and intface vlan. ... vlan 1 bieng a native vlan remains there eve if i dont gv switch an ip address .. lease suggest.
Which of the following are Session Layer standards? A.) ASCII and EBCDIC B.) MPEG and MIDI C.) RPC and SQL D.) JPEG and PICT
Ping uses which Internet layer protocol? A.) RARP B.) ICMP C.) ARP D.) FTP