Exam 10: Access Lists
Exam 1: Introducing Networks42 Questions
Exam 2: Network Devices42 Questions
Exam 3: Tcpip42 Questions
Exam 4: Ip Addressing42 Questions
Exam 5: Router and Ios Basics42 Questions
Exam 6: Router Startup and Configuration42 Questions
Exam 7: Routing Protocols42 Questions
Exam 8: Advanced Routing Protocols42 Questions
Exam 9: Network Services42 Questions
Exam 10: Access Lists42 Questions
Exam 11: Ppp and Frame Relay42 Questions
Exam 12: Basic Switching and Switch Configuration42 Questions
Exam 13: Advanced Switching Concepts42 Questions
Exam 14: Network Security42 Questions
Select questions type
If you create and apply the lists and they have the intended results, you can cancel the scheduled reload with the ____ command.
(Multiple Choice)
4.7/5
(29)
Access lists can take the place of more advanced security measures, such as firewalls.
(True/False)
4.9/5
(34)
Access lists begin working the second they are applied to an interface.
(True/False)
5.0/5
(36)
____________________ are permit or deny statements that filter traffic based on the source address, destination address, protocol type, and port number of a packet.
(Short Answer)
4.8/5
(27)
With the ____ command, an administrator can schedule the router to reload in a certain number of minutes, hours, or even days.
(Multiple Choice)
4.8/5
(32)
Unlike the CLI, the SDM does allow a router to be configured as a firewall. To begin this task, click the ____ icon in the Tasks panel.
(Multiple Choice)
4.8/5
(34)
Match each item with a statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(30)
Traffic coming in to "the man in the router," through any of the interfaces, needs to be filtered using ____ traffic filters.
(Multiple Choice)
4.7/5
(29)
It is possible to replace the 0.0.0.0 255.255.255.255 entry, which represents all hosts and all networks, with the ____ keyword.
(Multiple Choice)
4.8/5
(37)
Describe each element of the extended IP access list configuration syntax.
(Essay)
4.9/5
(32)
With careful planning, you can create access lists that control which traffic crosses particular links, and which segments of your network will have access to others.
(True/False)
4.8/5
(43)
You must use the ____ command to save the list after configuration if you want it to survive a router reload.
(Multiple Choice)
4.9/5
(39)
Routers use ____ to determine which bits in an address will be significant.
(Multiple Choice)
4.8/5
(35)
Access lists to block a router's outward delivery must be applied as ____________________ filters.
(Short Answer)
4.9/5
(35)
When making changes, you must remove the access list, using the ____ command.
(Multiple Choice)
4.7/5
(29)
Use the ____ command to remove the application of the list.
(Multiple Choice)
4.9/5
(26)
SDM allows you to easily create a standard or an extended access list or, as it is known in the SDM, a(n) ____.
(Multiple Choice)
4.9/5
(34)
Traffic coming in to the "man in the router," through any of the interfaces, is considered ____________________.
(Short Answer)
4.8/5
(37)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)