You create the following standard access-list
access-list 1 deny 1.1.1.1
access-list 1 deny 2.2.2.2
int e0
ip access-group 1 in
Which of the following statements are true, with regard to
traffic flowing
into E0?
A.) This will stop IP packets with a source address of
1.1.1.1 only.
B.) This will stop all IP packets.
C.) This is an invalid configuration.
D.) This will stop no IP packets.
E.) This will stop IP packets with a source address of
2.2.2.2 only.
F.) This will stop IP packets with a source address of
1.1.1.1 and 2.2.2.2.
Answer Posted / guest
Answer: D
Is This Answer Correct ? | 2 Yes | 1 No |
Post New Answer View All Answers
Can you explain the broader steps of how L2F establishes the tunnel?
How do we do encryption and authentication in L2F?
What is hold down time formula of ospf?
What are the possible ways of data exchange in ccna?
What are the different layers of osi model?
After how long eigrp protocol advertise its routing table?
What is default size of hello packets in ospf?
Can you explain L2TP?
What is the difference between switch, routers, and hub?
What does aaa stands for?
What does the show protocol display?
Why do you use ‘service password encryption’?
what's the difference between Symmetric and Asymmetric cryptosystem?
Value in which type of access list?
What is difference between tcp/ip and osi model?