You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?
Options
A. show access-lists
B. show interface Ethernet 0
C. show ip access-lists
D. show ip interface Ethernet 0
Correct Answer
show ip interface Ethernet 0
Explanation
The only command that shows which access lists have been applied to an interface is
show ip interface Ethernet 0. The command
show access-lists displays all configured access lists, and
show ip access-lists displays all configured IP access lists, but neither command indicates whether the displayed access lists have been applied to an interface.
More questions
1. What is the maximum distance with maximum data rate for 802.11g?
You need 5 subnets, each with at least 16 hosts. The mask 255.255.255.240 provides 16 subnets with 14 hosts-this will not work. The mask 255.255.255.224 provides 8 subnets, each with 30 hosts. This is the best answer.
4. Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational?
If you have a router in your Frame Relay network that does not support IARP, you must create Frame Relay maps on your router, which provide known DLCI-to-IP address mappings.
5. What VTP mode allows you to change VLAN information on the switch?
A CIDR address of /19 is 255.255.224.0. This is a Class B address, so that is only 3 subnet bits, but it provides 13 host bits, or 8 subnets, each with 8,190 hosts.
7. Which command will allow you to see real-time translations on your router?
Any secondary route to a remote network is considered a feasible successor, and those routes are only found in the topology table and used as backup routes in case of primary route failure. You can see the topology table with the
show ip eigrp topology command.
10. Which of the following encapsulates PPP frames in Ethernet frames and uses common PPP features like authentication, encryption, and compression?