Telnet access to the router is restricted by using either a standard or extended IP access list inbound on the VTY lines of the router. The command
access-class is used to apply the access list to the VTY lines.
Security problems
Search Results
1. You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with?
First, you must know that a /19 is 255.255.224.0, which is a block size of 32 in the third octet. Counting by 32, this makes our subnet 192 in the third octet, and the wildcard for the third octet would be 31 since the wildcard is always one less than the block size.
2. You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?
Options
A. access-list 10 deny 192.168.160.0 255.255.224.0
The range of 192.168.160.0 to 192.168.191.0 is a block size of 32. The network address is 192.168.160.0 and the mask would be 255.255.224.0, which for an access list must be a wildcard format of 0.0.31.255. The 31 is used for a block size of 32. The wildcard is always one less than the block size.
3. Which of the following commands connect access list 110 inbound to interface ethernet0?
Only the
show ip interface command will tell you which interfaces have access lists applied.
show access-lists will not show you which interfaces have an access list applied.
5. You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with?
First, you must know that a /21 is 255.255.248.0, which is a block size of 8 in the third octet. Counting by eight, this makes our subnet 144 in the third octet, and the wildcard for the third octet would be 7 since the wildcard is always one less than the block size.
6. You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?
The only command that shows which access lists have been applied to an interface is
show ip interface Ethernet 0. The command
show access-lists displays all configured access lists, and
show ip access-lists displays all configured IP access lists, but neither command indicates whether the displayed access lists have been applied to an interface.
7. You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?
First, you must know that a /20 is 255.255.240.0, which is a block size of 16 in the third octet. Counting by 16s, this makes our subnet 48 in the third octet, and the wildcard for the third octet would be 15 since the wildcard is always one less than the block size.
8. Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list?
The IEEE 802.11h standard provides an addition 11 channels to the 802.11a standard's 12 non-overlapping channel for a total of 23 non-overlapping channels.
10. What is the maximum distance running the lowest data rate for 802.11b?