logo

CuriousTab

CuriousTab

Discussion


Home Certification CISCO Certification Comments

  • Question
  • Which command would you use to apply an access list to a router interface?


  • Options
  • A. ip access - list 101 out
  • B. acces - list ip 101 in
  • C. ip access - group 101 in
  • D. access - group ip 101 in

  • Correct Answer
  • ip access - group 101 in 

    Explanation

    To apply an access list , the proper command is ip access - group 101 in.


  • CISCO Certification problems


    Search Results


    • 1. If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?

    • Options
    • A. access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet
    • B. access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet
    • C. access - list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23
    • D. access - list 100 deny 192.168.10.0 0.0.0.255 any eq 23
    • Discuss
    • 2. What router command allows you to determine whether an IP access list is enabled on a particular interface?

    • Options
    • A. show ip port
    • B. show access - lists
    • C. show ip interface
    • D. show access - lists interface
    • Discuss
    • 3. You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0 . Which of the following lists will you use?

    • Options
    • A. access - list 10 deny 192.168.160.0 255.255.224.0
    • B. access - list 10 deny 192.168.160.0 0.0.191.255
    • C. access - list 10 deny 192.168.160.0 0.0.31.255
    • D. access - list 10 deny 192.168.0.0 0.0.31.255
    • Discuss
    • 4. Which of the following is an example of a standard IP access list?

    • Options
    • A. access - list 110 permit host 1.1.1.1
    • B. access - list 1 deny 172 . 16 . 10 . 1 0 . 0 . 0 . 0
    • C. access - list 1 permit 172 . 16 . 10 . 1 255 . 255 . 0 . 0
    • D. access - list standard 1 . 1 . 1 . 1
    • Discuss
    • 5. What type of Cisco tagging information allows VLANs to be multiplexed over a trunk link through an external encapsulation method?
    • Discuss
    • 6. What is the most common attack on a network today?

    • Options
    • A. Lock picking
    • B. Naggle
    • C. DoS
    • D. auto secure
    • Discuss
    • 7. What command would you use to create an extended access list that stops host 172.16.10.1 fro telnetting to host 172.16.30.5?
    • Discuss
    • 8. What command would you use to set an access list on a VTY line?
    • Discuss
    • 9. Which command will allow you to see real - time translations on your router?

    • Options
    • A. show ip nat translations
    • B. show ip nat statistics
    • C. debug ip nat
    • D. clear ip nat translations
    • Discuss
    • 10. Which command will create a dynamic pool named Todd that will provide you with 30 global addresses?

    • Options
    • A. ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.240
    • B. ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.224
    • C. ip nat pool todd 171.16.10.65 171.16.10.94 net 255.255.255.224
    • D. ip nat pool Todd 171.16.10.1 171.16.10.254 net 255.255.255.0
    • Discuss


    Comments

    There are no comments.

Enter a new Comment