Cisco 7.0

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?

8

Which three statements describes acl processing of packets

An implicit deny any rejects any packet that does not match any ACE A packet can either be rejected or forwarding as directed by the ACE that is matched Each statement is checked only until a match is detected or until a match is detected or until the end of the ACE list

Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?

Manually add the new deny ACE with a sequence number of 5.

A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task

Router1(config)# access-list 10 permit host 192.168.15.23 Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0

Consider the following output for an ACL that has been applied to a router via the access-class in command. What can a network administrator determine from the output that is shown?

Two devices were able to use SSH or Telnet to gain access to the router.

Which type of ACL statements are commonly reordered by the Cisco IOS as the first ACEs?

host

On which router should the show access-lists command be executed?

on the router that has the ACL configured*

In which configuration would an outbound acl placement be preferred over inbound acl placement

when acl is applied to an outbound interface to filter packets from multiple inbound interfaces before before packet exit the interfaces

Match each statement with the example subnet and wildcard that it describes. (Not all options are used.)

192.168.15.65 255.255.255.240 ==> the first valid host address in a subnet 192.168.15.144 0.0.0.15 ==> subnetwork address of a subnet with 14 valid host addreses host 192.168.15.2 ==> all IP address bits must match exactly 192.168.5.0 0.0.3.255 ==> hosts in a subnet with SM 255.255.252.0 192.168.3.64 0.0.0.7 ==> address with a subnet 255.255.255.248

Refer to the exhibit. An ACL was configured on R1 with the intention of denying traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0/24. All other traffic into subnet 172.16.3.0/24 should be permitted. This standard ACL was then applied outbound on interface Fa0/0. Which conclusion can be drawn from this configuration?​

All traffic will be blocked, not just traffic from the 172.16.4.0/24 subnet.*

Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)

Filter unwanted traffic before it travels onto a low-bandwidth link. Place extended ACLs close to the source IP address of the traffic. Place standard ACLs close to the destination IP address of the traffic.

Refer to the following output. What is the significance of the 4 match(es) statement

Four packets have been allowed through the router from PCs in the network of 192.168.1.64.

Which statement describe a difference between the operation of inbound and outbounds

Inbound acl are processed before the packets are routed while outbound acls are processed after the routing is complete.

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

R1(config-line)# access-class 1 in

Refer to the exhibit. What will happen to the access list 10 ACEs if the router is rebooted before any other commands are implemented

The ACEs of access list 10 will be renumbered.*

A network administrator is configuring an ACL to restrict access to certain servers in the data center. The intent is to apply the ACL to the interface connected to the data center LAN. What happens if the ACL is incorrectly applied to an interface in the inbound direction instead of the outbound direction?

The ACL does not perform as designed.*

What is the effect of configuring an ACL with only ACEs that deny traffic?

The ACL will block all traffic.

What is the quickest way to remove a single ACE from a named ACL

Use the no keyword and the sequence number of the ACE to be removed.

Refer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached to R1?

access-list 1 permit 192.168.10.96 0.0.0.31

What single access list statement matches all of the following networks? 192.168.16.0 192.168.17.0 192.168.18.0 192.168.19.0

access-list 10 permit 192.168.16.0 0.0.3.255

Refer to the exhibit. If the network administrator created a standard ACL that allows only devices that connect to the R2 G0/0 network access to the devices on the R1 G0/1 interface, how should the ACL be applied?

outbound on the R1 G0/1 interface

Which address is required in the command syntax of a standard ACL

source ip address

Which feature will require the use of a named standard ACL rather than a numbered standard ACL

the ability to add additional ACEs in the middle of the ACL without deleting and re-creating the list*

Which type of router connection can be secured by the access-class command

vty

When would a network administrator use the clear access-list counters command?

when troubleshooting an ACL and needing to know how many packets matched*


Set pelajaran terkait

Prioritization and Delegation Questions

View Set

Text and Traditions II Final Exam

View Set

Exam 2 : bacteria, replication, transcription, translation

View Set