Exam 10: Access Lists

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If you create and apply the lists and they have the intended results, you can cancel the scheduled reload with the ____ command.

(Multiple Choice)
4.7/5
(29)

Access lists can take the place of more advanced security measures, such as firewalls.

(True/False)
4.9/5
(34)

Access lists begin working the second they are applied to an interface.

(True/False)
5.0/5
(36)

____________________ are permit or deny statements that filter traffic based on the source address, destination address, protocol type, and port number of a packet.

(Short Answer)
4.8/5
(27)

With the ____ command, an administrator can schedule the router to reload in a certain number of minutes, hours, or even days.

(Multiple Choice)
4.8/5
(32)

Unlike the CLI, the SDM does allow a router to be configured as a firewall. To begin this task, click the ____ icon in the Tasks panel.

(Multiple Choice)
4.8/5
(34)
Match each item with a statement below:
determines which bits of the source address are significant
Wildcard mask
one of the most common problems associated with access lists
no access-list [list #]
the mixing of 0s and 1s in a wildcard mask octet
Extended IP access lists
Correct Answer:
Verified
Premises:
Responses:
determines which bits of the source address are significant
Wildcard mask
one of the most common problems associated with access lists
no access-list [list #]
the mixing of 0s and 1s in a wildcard mask octet
Extended IP access lists
the default for standard IP access lists
Standard IP access lists
removes an access list
Access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
Named access lists
use names instead of numbers to identify themselves
Lack of planning
filter by source IP address, destination IP address, protocol type, and application port number
Single host wildcard mask
permit or deny packets based only on the source address
Partial masking
(Matching)
4.8/5
(30)

Traffic coming in to "the man in the router," through any of the interfaces, needs to be filtered using ____ traffic filters.

(Multiple Choice)
4.7/5
(29)

Why should you use a text editor to create access lists?

(Essay)
4.7/5
(38)

It is possible to replace the 0.0.0.0 255.255.255.255 entry, which represents all hosts and all networks, with the ____ keyword.

(Multiple Choice)
4.8/5
(37)

Describe each element of the extended IP access list configuration syntax.

(Essay)
4.9/5
(32)

With careful planning, you can create access lists that control which traffic crosses particular links, and which segments of your network will have access to others.

(True/False)
4.8/5
(43)

You must use the ____ command to save the list after configuration if you want it to survive a router reload.

(Multiple Choice)
4.9/5
(39)

Routers use ____ to determine which bits in an address will be significant.

(Multiple Choice)
4.8/5
(35)

Access lists to block a router's outward delivery must be applied as ____________________ filters.

(Short Answer)
4.9/5
(35)

When making changes, you must remove the access list, using the ____ command.

(Multiple Choice)
4.7/5
(29)

Use the ____ command to remove the application of the list.

(Multiple Choice)
4.9/5
(26)

Where should you place standard and extended IP access lists?

(Essay)
4.9/5
(29)

SDM allows you to easily create a standard or an extended access list or, as it is known in the SDM, a(n) ____.

(Multiple Choice)
4.9/5
(34)

Traffic coming in to the "man in the router," through any of the interfaces, is considered ____________________.

(Short Answer)
4.8/5
(37)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)