logo

CuriousTab

CuriousTab

Discussion


Home Networking Security See What Others Are Saying!
  • Question
  • Which of the following is true regarding access lists applied to an interface?


  • Options
  • A. You can place as many access lists as you want on any interface until you run out of memory.
  • B. You can apply only one access list on any interface.
  • C. One access list may be configured, per direction, for each layer 3 protocol configured on an interface.
  • D. You can apply two access lists to any interface.

  • Correct Answer
  • One access list may be configured, per direction, for each layer 3 protocol configured on an interface. 

    Explanation
    A Cisco router has rules regarding the placement of access lists on a router interface. You can place one access list per direction for each layer 3 protocol configured on an interface.

  • More questions

    • 1. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?

    • Options
    • A. 14
    • B. 15
    • C. 16
    • D. 30
    • Discuss
    • 2. What are two purposes for segmentation with a bridge?

      1. To add more broadcast domains.
      2. To create more collision domains.
      3. To add more bandwidth for users.
      4. To allow more broadcasts for users.

    • Options
    • A. 1 only
    • B. 2 and 3
    • C. 2 and 4
    • D. 4 only
    • Discuss
    • 3. Why does the data communication industry use the layered OSI reference model?

      1. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
      2. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.
      3. It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers.
      4. It encourages industry standardization by defining what functions occur at each layer of the model.

    • Options
    • A. 1 only
    • B. 1 and 4
    • C. 2 and 3
    • D. 3 only
    • Discuss
    • 4. Which of the following allows a router to respond to an ARP request that is intended for a remote host?

    • Options
    • A. Gateway DP
    • B. Reverse ARP (RARP)
    • C. Proxy ARP
    • D. Inverse ARP (IARP)
    • Discuss
    • 5. Which of the following statements are true regarding the command ip route 172.16.4.0 255.255.255.0 192.168.4.2?

      1. The command is used to establish a static route.
      2. The default administrative distance is used.
      3. The command is used to configure the default route.
      4. The subnet mask for the source address is 255.255.255.0.

    • Options
    • A. 1 and 2
    • B. 2 and 4
    • C. 3 and 4
    • D. All of the above
    • Discuss
    • 6. What should the configuration register value be after you successfully complete the password recovery procedure and return the router to normal operation?

    • Options
    • A. 0x2100
    • B. 0x2101
    • C. 0x2102
    • D. 0x2142
    • Discuss
    • 7. Which of the following network types have a designated router and a backup designated router assigned?

      1. Broadcast
      2. Point-to-point
      3. NBMA
      4. NBMA point-to-point

    • Options
    • A. 1, 2 and 3
    • B. 1 and 3
    • C. 3 and 4
    • D. All of the above
    • Discuss
    • 8. You telnet into a remote device and type debug ip rip, but no output from the debug command is seen. What could the problem be?

    • Options
    • A. You must type the show ip rip command first.
    • B. IP addressing on the network is incorrect.
    • C. You must use the terminal monitor command.
    • D. Debug output is sent only to the console.
    • Discuss
    • 9. Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question.

    • Options
    • A. 192.168.10.142
    • B. 192.168.10.66
    • C. 192.168.100.254
    • D. 192.168.10.143
    • E. 192.168.10.126
    • Discuss
    • 10. What are the two main types of access control lists (ACLs)?

      1. Standard
      2. IEEE
      3. Extended
      4. Specialized

    • Options
    • A. 1 and 3
    • B. 2 and 4
    • C. 3 and 4
    • D. 1 and 2
    • Discuss


    Comments

    There are no comments.

Enter a new Comment