logo

CuriousTab

CuriousTab

Discussion


Home Certification CISCO Certification Comments

  • Question
  • If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?


  • Options
  • A. access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet
  • B. access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet
  • C. access - list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23
  • D. access - list 100 deny 192.168.10.0 0.0.0.255 any eq 23

  • Correct Answer
  • access - list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 

    Explanation

    The extended access list ranges are 100 - 199 and 2000 - 2699, so the access-list number of 100 is valid. Telnet uses TCP, so the protocol TCP is valid. Now you just need to look for the source and destination address. only the third option has the correct sequence of parameters. Option B may work, but the question specifically states "only" to network 192.168.10.0, and the wildcard in option B is too broad.


  • CISCO Certification problems


    Search Results


    • 1. What router command allows you to determine whether an IP access list is enabled on a particular interface?

    • Options
    • A. show ip port
    • B. show access - lists
    • C. show ip interface
    • D. show access - lists interface
    • Discuss
    • 2. You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0 . Which of the following lists will you use?

    • Options
    • A. access - list 10 deny 192.168.160.0 255.255.224.0
    • B. access - list 10 deny 192.168.160.0 0.0.191.255
    • C. access - list 10 deny 192.168.160.0 0.0.31.255
    • D. access - list 10 deny 192.168.0.0 0.0.31.255
    • Discuss
    • 3. Which of the following is an example of a standard IP access list?

    • Options
    • A. access - list 110 permit host 1.1.1.1
    • B. access - list 1 deny 172 . 16 . 10 . 1 0 . 0 . 0 . 0
    • C. access - list 1 permit 172 . 16 . 10 . 1 255 . 255 . 0 . 0
    • D. access - list standard 1 . 1 . 1 . 1
    • Discuss
    • 4. What type of Cisco tagging information allows VLANs to be multiplexed over a trunk link through an external encapsulation method?
    • Discuss
    • 5. What is frame tagging?
    • Discuss
    • 6. Which command would you use to apply an access list to a router interface?

    • Options
    • A. ip access - list 101 out
    • B. acces - list ip 101 in
    • C. ip access - group 101 in
    • D. access - group ip 101 in
    • Discuss
    • 7. What is the most common attack on a network today?

    • Options
    • A. Lock picking
    • B. Naggle
    • C. DoS
    • D. auto secure
    • Discuss
    • 8. What command would you use to create an extended access list that stops host 172.16.10.1 fro telnetting to host 172.16.30.5?
    • Discuss
    • 9. What command would you use to set an access list on a VTY line?
    • Discuss
    • 10. Which command will allow you to see real - time translations on your router?

    • Options
    • A. show ip nat translations
    • B. show ip nat statistics
    • C. debug ip nat
    • D. clear ip nat translations
    • Discuss


    Comments

    There are no comments.

Enter a new Comment