What should be the first command to create an access-list that
prevents all users on subnetwork 10.10.128.0, using subnet mask
255.255.192.0, from being
able to telnet anywhere?
A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq
telnet
B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq
telnet
C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq
telnet
E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq
telnet
F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq
telnet
Answer Posted / shahin
Mr Tahir, Ur answer is wrong. As of no subnet mask is used
in ACL. It use WILD CARD MASK.
So correct answer wud be A.
access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq
| Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
How do we do encryption and authentication in L2F?
Which protocol used before part of ccna?
What are the different types of VPN?
What is the virtual path?
What is the name of best path in eigrp protocol?
hi shain can u send me some detail about bgp so that i can enhance my knowledge over bgp and can you also teach me about the process of suppernating. now what i am thinking that this could be last visit on that site overhere.so please mail that short of thing on my gmail id i am requesting to all of the visitor that please send theire doubt or question to my new gmail id which is jitendera.ccnainterview@gmail.com.i will try to solve it if i am capable to do it Wishing all of you for great future Jitendera kaumar sinha
What is the function of the Application Layer in networking?
Mention what is bootp?
What is difference between flsm and vlsm?
Define topology?
Can you describe the Authentication Header (AH) Protocol?
Explain why is udp lease favored when compared to tcp?
Explain dhcp scope?
What is de-encapsulation?
What is the easiest way to remotely configure a router?