Exam 10: Access Lists

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ IP access lists filter network traffic based on the source IP address only.

Free
(Short Answer)
4.9/5
(35)
Correct Answer:
Verified

Standard

What are some of the advantages of using named access lists?

Free
(Essay)
4.7/5
(33)
Correct Answer:
Verified

The naming feature allows you to maintain security by using an easily identifiable access list. It also removes the limit of 100 lists per filter type. In addition, with named access lists lines can be selectively deleted in the ACL. This feature does not allow you to add lines to the ACL; any lines added to a named ACL are applied to the end of the list. Named ACLs provide greater flexibility to network administrators who work in environments where large numbers of ACLs are needed, such as a large ISP.

What are the rules all access lists follow?

Free
(Essay)
4.8/5
(37)
Correct Answer:
Verified

In summary, all access lists follow these rules:
• Routers apply lists sequentially in the order in which you type them into the router.
• Routers apply lists to packets sequentially, from the top down, one line at a time.
• Packets are processed only until a match is made, and then they are acted upon based on the access list criteria contained in access list statements.
• Lists always end with an implicit deny. Routers discard any packets that do not match any of the access list statements.
• Access lists must be applied to an interface as either inbound or outbound traffic filters.
• Only one list, per protocol, per direction can be applied to an interface.
• Access lists are effective as soon as they are applied; however, you must use the copy run start command to save the list after configuration if you want it to survive a router reload.

To apply the inbound access list 1 to an interface, you use the following command: ____.

(Multiple Choice)
4.9/5
(46)

To remove an extended IP access list from an interface, you enter interface configuration mode and use the ____ command.

(Multiple Choice)
4.8/5
(33)

____ provides a GUI-based configuration tool for Cisco devices.

(Multiple Choice)
4.9/5
(35)

The following command sets an outbound access list filter: ____.

(Multiple Choice)
4.9/5
(42)

The access list ends with an implicit ____________________ statement, which blocks all packets that do not meet the requirements of the access list.

(Short Answer)
4.7/5
(27)

To name a standard IP access list, use the following syntax: ____ .

(Multiple Choice)
4.9/5
(30)

How can you monitor standard IP access lists?

(Essay)
4.8/5
(25)

How can you monitor extended IP access lists?

(Essay)
4.8/5
(43)

The configuration of a(n) ____ is the main difference between the Basic and Advance firewall wizards.

(Multiple Choice)
4.8/5
(32)

To name an extended IP access list, use the following syntax: ____ .

(Multiple Choice)
4.8/5
(26)

To apply a standard IP named list to an interface, use the following syntax: ____ .

(Multiple Choice)
4.8/5
(31)

Describe each element of the standard IP access list configuration syntax.

(Essay)
4.8/5
(42)

To view which interfaces have IP access lists set, use the ____ command.

(Multiple Choice)
4.9/5
(37)

What kind of tasks can you perform on the SDM's Interfaces and Connection screen?

(Essay)
4.8/5
(33)

Briefly describe wildcard masks.

(Essay)
4.9/5
(37)

You can remove individual lines in an access list.

(True/False)
4.8/5
(33)

Smart network engineers pay close attention to network traffic flow and security when they design and manage their networks.

(True/False)
4.8/5
(33)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)