Deck 10: Access Lists

Full screen (f)
exit full mode
Question
Regarding extended IP access lists, the ____ keyword is short for a wildcard mask of 0.0.0.0.

A) host
B) any
C) none
D) all
Use Space or
up arrow
down arrow
to flip the card.
Question
If you create and apply the lists and they have the intended results, you can cancel the scheduled reload with the ____ command.

A) reload 0
B) reload abort
C) reload cancel
D) reload off
Question
To apply the inbound access list 1 to an interface, you use the following command: ____.

A) ip access-group 1 out
B) ip access-group 1 int
C) ip access-group 1 ext
D) ip access-group 1 in
Question
It is possible to replace the 0.0.0.0 255.255.255.255 entry, which represents all hosts and all networks, with the ____ keyword.

A) all
B) any
C) each
D) none
Question
Access lists begin working the second they are applied to an interface.
Question
With the ____ command, an administrator can schedule the router to reload in a certain number of minutes, hours, or even days.

A) interval
B) refresh
C) restart
D) reload
Question
To name a standard IP access list, use the following syntax: ____ .

A) ip access-list named [name]
B) named access-list standard [name]
C) ip access-list standard [name]
D) ip named-access-list [name]
Question
With careful planning, you can create access lists that control which traffic crosses particular links, and which segments of your network will have access to others.
Question
The following command sets an outbound access list filter: ____.

A) ip access-group 1 ext
B) ip access-group 1 out
C) ip access-group 1 int
D) ip access-group 1 in
Question
To view which interfaces have IP access lists set, use the ____ command.

A) show ip in
B) show ip out
C) show ip interface
D) show ip any
Question
To remove an extended IP access list from an interface, you enter interface configuration mode and use the ____ command.

A) no ip ext access-group [list #] [in|out]
B) extended no ip access-group [list #] [in|out]
C) no ext access-group [list #] [in|out]
D) no ip access-group [list #] [in|out]
Question
You must use the ____ command to save the list after configuration if you want it to survive a router reload.

A) copy reload
B) copy start on
C) copy run start
D) copy run reload
Question
To view the access lists defined on your router, use the ____ command.

A) show access-lists
B) show lists
C) display access-lists
D) access-lists show
Question
Smart network engineers pay close attention to network traffic flow and security when they design and manage their networks.
Question
You can remove individual lines in an access list.
Question
Access lists can take the place of more advanced security measures, such as firewalls.
Question
When making changes, you must remove the access list, using the ____ command.

A) no access-list [list number]
B) access-list off [list number]
C) off access-list [list number]
D) access-list [list number] no
Question
Use the ____ command to remove the application of the list.

A) no accessgroup [ip][list #][direction]
B) no ip [accessgroup][list #][direction]
C) no ip access-list [list #][direction]
D) no ip access-group [list #][direction]
Question
Routers use ____ to determine which bits in an address will be significant.

A) wildcard masks
B) access masks
C) list numbers
D) address rules
Question
Traffic coming in to "the man in the router," through any of the interfaces, needs to be filtered using ____ traffic filters.

A) outgoing
B) incoming
C) exterior
D) outbound
Question
Traffic coming in to the "man in the router," through any of the interfaces, is considered ____________________.
Question
The configuration of a(n) ____ is the main difference between the Basic and Advance firewall wizards.

A) NAT server
B) DMZ
C) intranet
D) proxy server
Question
The access list ends with an implicit ____________________ statement, which blocks all packets that do not meet the requirements of the access list.
Question
What are the rules all access lists follow?
Question
What are some of the advantages of using named access lists?
Question
Unlike the CLI, the SDM does allow a router to be configured as a firewall. To begin this task, click the ____ icon in the Tasks panel.

A) Firewall and ACL
B) Security Audit
C) Routing
D) NAT
Question
____ provides a GUI-based configuration tool for Cisco devices.

A) CLI
B) SDM
C) CCL
D) ACL
Question
To name an extended IP access list, use the following syntax: ____ .

A) extended ip named-access-list [name]
B) ip access-list extended [name]
C) named-access-list extended [name]
D) ip access-list named [name]
Question
Describe each element of the extended IP access list configuration syntax.
Question
____________________ are permit or deny statements that filter traffic based on the source address, destination address, protocol type, and port number of a packet.
Question
Describe each element of the standard IP access list configuration syntax.
Question
To apply a standard IP named list to an interface, use the following syntax: ____ .

A) ip standard access-group [name] [in | out]
B) ip standard-group [name] [in | out]
C) ip apply access-group [name] [in | out]
D) ip access-group [name] [in | out]
Question
Why should you use a text editor to create access lists?
Question
Where should you place standard and extended IP access lists?
Question
How can you monitor standard IP access lists?
Question
____________________ IP access lists filter network traffic based on the source IP address only.
Question
Access lists to block a router's outward delivery must be applied as ____________________ filters.
Question
How can you monitor extended IP access lists?
Question
SDM allows you to easily create a standard or an extended access list or, as it is known in the SDM, a(n) ____.

A) VTY
B) TTY
C) ACL
D) CLI
Question
Briefly describe wildcard masks.
Question
What kind of tasks can you perform on the SDM's Interfaces and Connection screen?
Question
Match between columns
determines which bits of the source address are significant
Partial masking
determines which bits of the source address are significant
Access lists
determines which bits of the source address are significant
Named access lists
determines which bits of the source address are significant
Lack of planning
determines which bits of the source address are significant
Extended IP access lists
determines which bits of the source address are significant
no access-list [list #]
determines which bits of the source address are significant
Single host wildcard mask
determines which bits of the source address are significant
Wildcard mask
determines which bits of the source address are significant
Standard IP access lists
one of the most common problems associated with access lists
Partial masking
one of the most common problems associated with access lists
Access lists
one of the most common problems associated with access lists
Named access lists
one of the most common problems associated with access lists
Lack of planning
one of the most common problems associated with access lists
Extended IP access lists
one of the most common problems associated with access lists
no access-list [list #]
one of the most common problems associated with access lists
Single host wildcard mask
one of the most common problems associated with access lists
Wildcard mask
one of the most common problems associated with access lists
Standard IP access lists
the mixing of 0s and 1s in a wildcard mask octet
Partial masking
the mixing of 0s and 1s in a wildcard mask octet
Access lists
the mixing of 0s and 1s in a wildcard mask octet
Named access lists
the mixing of 0s and 1s in a wildcard mask octet
Lack of planning
the mixing of 0s and 1s in a wildcard mask octet
Extended IP access lists
the mixing of 0s and 1s in a wildcard mask octet
no access-list [list #]
the mixing of 0s and 1s in a wildcard mask octet
Single host wildcard mask
the mixing of 0s and 1s in a wildcard mask octet
Wildcard mask
the mixing of 0s and 1s in a wildcard mask octet
Standard IP access lists
the default for standard IP access lists
Partial masking
the default for standard IP access lists
Access lists
the default for standard IP access lists
Named access lists
the default for standard IP access lists
Lack of planning
the default for standard IP access lists
Extended IP access lists
the default for standard IP access lists
no access-list [list #]
the default for standard IP access lists
Single host wildcard mask
the default for standard IP access lists
Wildcard mask
the default for standard IP access lists
Standard IP access lists
removes an access list
Partial masking
removes an access list
Access lists
removes an access list
Named access lists
removes an access list
Lack of planning
removes an access list
Extended IP access lists
removes an access list
no access-list [list #]
removes an access list
Single host wildcard mask
removes an access list
Wildcard mask
removes an access list
Standard IP access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
Partial masking
built into the Cisco IOS; solve many problems associated with traffic flow and security
Access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
Named access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
Lack of planning
built into the Cisco IOS; solve many problems associated with traffic flow and security
Extended IP access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
no access-list [list #]
built into the Cisco IOS; solve many problems associated with traffic flow and security
Single host wildcard mask
built into the Cisco IOS; solve many problems associated with traffic flow and security
Wildcard mask
built into the Cisco IOS; solve many problems associated with traffic flow and security
Standard IP access lists
use names instead of numbers to identify themselves
Partial masking
use names instead of numbers to identify themselves
Access lists
use names instead of numbers to identify themselves
Named access lists
use names instead of numbers to identify themselves
Lack of planning
use names instead of numbers to identify themselves
Extended IP access lists
use names instead of numbers to identify themselves
no access-list [list #]
use names instead of numbers to identify themselves
Single host wildcard mask
use names instead of numbers to identify themselves
Wildcard mask
use names instead of numbers to identify themselves
Standard IP access lists
filter by source IP address, destination IP address, protocol type, and application port number
Partial masking
filter by source IP address, destination IP address, protocol type, and application port number
Access lists
filter by source IP address, destination IP address, protocol type, and application port number
Named access lists
filter by source IP address, destination IP address, protocol type, and application port number
Lack of planning
filter by source IP address, destination IP address, protocol type, and application port number
Extended IP access lists
filter by source IP address, destination IP address, protocol type, and application port number
no access-list [list #]
filter by source IP address, destination IP address, protocol type, and application port number
Single host wildcard mask
filter by source IP address, destination IP address, protocol type, and application port number
Wildcard mask
filter by source IP address, destination IP address, protocol type, and application port number
Standard IP access lists
permit or deny packets based only on the source address
Partial masking
permit or deny packets based only on the source address
Access lists
permit or deny packets based only on the source address
Named access lists
permit or deny packets based only on the source address
Lack of planning
permit or deny packets based only on the source address
Extended IP access lists
permit or deny packets based only on the source address
no access-list [list #]
permit or deny packets based only on the source address
Single host wildcard mask
permit or deny packets based only on the source address
Wildcard mask
permit or deny packets based only on the source address
Standard IP access lists
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Access Lists
1
Regarding extended IP access lists, the ____ keyword is short for a wildcard mask of 0.0.0.0.

A) host
B) any
C) none
D) all
A
2
If you create and apply the lists and they have the intended results, you can cancel the scheduled reload with the ____ command.

A) reload 0
B) reload abort
C) reload cancel
D) reload off
C
3
To apply the inbound access list 1 to an interface, you use the following command: ____.

A) ip access-group 1 out
B) ip access-group 1 int
C) ip access-group 1 ext
D) ip access-group 1 in
D
4
It is possible to replace the 0.0.0.0 255.255.255.255 entry, which represents all hosts and all networks, with the ____ keyword.

A) all
B) any
C) each
D) none
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Access lists begin working the second they are applied to an interface.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
With the ____ command, an administrator can schedule the router to reload in a certain number of minutes, hours, or even days.

A) interval
B) refresh
C) restart
D) reload
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
To name a standard IP access list, use the following syntax: ____ .

A) ip access-list named [name]
B) named access-list standard [name]
C) ip access-list standard [name]
D) ip named-access-list [name]
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
With careful planning, you can create access lists that control which traffic crosses particular links, and which segments of your network will have access to others.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
The following command sets an outbound access list filter: ____.

A) ip access-group 1 ext
B) ip access-group 1 out
C) ip access-group 1 int
D) ip access-group 1 in
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
To view which interfaces have IP access lists set, use the ____ command.

A) show ip in
B) show ip out
C) show ip interface
D) show ip any
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
To remove an extended IP access list from an interface, you enter interface configuration mode and use the ____ command.

A) no ip ext access-group [list #] [in|out]
B) extended no ip access-group [list #] [in|out]
C) no ext access-group [list #] [in|out]
D) no ip access-group [list #] [in|out]
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
You must use the ____ command to save the list after configuration if you want it to survive a router reload.

A) copy reload
B) copy start on
C) copy run start
D) copy run reload
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
To view the access lists defined on your router, use the ____ command.

A) show access-lists
B) show lists
C) display access-lists
D) access-lists show
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Smart network engineers pay close attention to network traffic flow and security when they design and manage their networks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
You can remove individual lines in an access list.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Access lists can take the place of more advanced security measures, such as firewalls.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
When making changes, you must remove the access list, using the ____ command.

A) no access-list [list number]
B) access-list off [list number]
C) off access-list [list number]
D) access-list [list number] no
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Use the ____ command to remove the application of the list.

A) no accessgroup [ip][list #][direction]
B) no ip [accessgroup][list #][direction]
C) no ip access-list [list #][direction]
D) no ip access-group [list #][direction]
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
Routers use ____ to determine which bits in an address will be significant.

A) wildcard masks
B) access masks
C) list numbers
D) address rules
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Traffic coming in to "the man in the router," through any of the interfaces, needs to be filtered using ____ traffic filters.

A) outgoing
B) incoming
C) exterior
D) outbound
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Traffic coming in to the "man in the router," through any of the interfaces, is considered ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
The configuration of a(n) ____ is the main difference between the Basic and Advance firewall wizards.

A) NAT server
B) DMZ
C) intranet
D) proxy server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
The access list ends with an implicit ____________________ statement, which blocks all packets that do not meet the requirements of the access list.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
What are the rules all access lists follow?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
What are some of the advantages of using named access lists?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Unlike the CLI, the SDM does allow a router to be configured as a firewall. To begin this task, click the ____ icon in the Tasks panel.

A) Firewall and ACL
B) Security Audit
C) Routing
D) NAT
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
____ provides a GUI-based configuration tool for Cisco devices.

A) CLI
B) SDM
C) CCL
D) ACL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
To name an extended IP access list, use the following syntax: ____ .

A) extended ip named-access-list [name]
B) ip access-list extended [name]
C) named-access-list extended [name]
D) ip access-list named [name]
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Describe each element of the extended IP access list configuration syntax.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
____________________ are permit or deny statements that filter traffic based on the source address, destination address, protocol type, and port number of a packet.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Describe each element of the standard IP access list configuration syntax.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
To apply a standard IP named list to an interface, use the following syntax: ____ .

A) ip standard access-group [name] [in | out]
B) ip standard-group [name] [in | out]
C) ip apply access-group [name] [in | out]
D) ip access-group [name] [in | out]
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Why should you use a text editor to create access lists?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Where should you place standard and extended IP access lists?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
How can you monitor standard IP access lists?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
____________________ IP access lists filter network traffic based on the source IP address only.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Access lists to block a router's outward delivery must be applied as ____________________ filters.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
How can you monitor extended IP access lists?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
SDM allows you to easily create a standard or an extended access list or, as it is known in the SDM, a(n) ____.

A) VTY
B) TTY
C) ACL
D) CLI
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Briefly describe wildcard masks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What kind of tasks can you perform on the SDM's Interfaces and Connection screen?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
determines which bits of the source address are significant
Partial masking
determines which bits of the source address are significant
Access lists
determines which bits of the source address are significant
Named access lists
determines which bits of the source address are significant
Lack of planning
determines which bits of the source address are significant
Extended IP access lists
determines which bits of the source address are significant
no access-list [list #]
determines which bits of the source address are significant
Single host wildcard mask
determines which bits of the source address are significant
Wildcard mask
determines which bits of the source address are significant
Standard IP access lists
one of the most common problems associated with access lists
Partial masking
one of the most common problems associated with access lists
Access lists
one of the most common problems associated with access lists
Named access lists
one of the most common problems associated with access lists
Lack of planning
one of the most common problems associated with access lists
Extended IP access lists
one of the most common problems associated with access lists
no access-list [list #]
one of the most common problems associated with access lists
Single host wildcard mask
one of the most common problems associated with access lists
Wildcard mask
one of the most common problems associated with access lists
Standard IP access lists
the mixing of 0s and 1s in a wildcard mask octet
Partial masking
the mixing of 0s and 1s in a wildcard mask octet
Access lists
the mixing of 0s and 1s in a wildcard mask octet
Named access lists
the mixing of 0s and 1s in a wildcard mask octet
Lack of planning
the mixing of 0s and 1s in a wildcard mask octet
Extended IP access lists
the mixing of 0s and 1s in a wildcard mask octet
no access-list [list #]
the mixing of 0s and 1s in a wildcard mask octet
Single host wildcard mask
the mixing of 0s and 1s in a wildcard mask octet
Wildcard mask
the mixing of 0s and 1s in a wildcard mask octet
Standard IP access lists
the default for standard IP access lists
Partial masking
the default for standard IP access lists
Access lists
the default for standard IP access lists
Named access lists
the default for standard IP access lists
Lack of planning
the default for standard IP access lists
Extended IP access lists
the default for standard IP access lists
no access-list [list #]
the default for standard IP access lists
Single host wildcard mask
the default for standard IP access lists
Wildcard mask
the default for standard IP access lists
Standard IP access lists
removes an access list
Partial masking
removes an access list
Access lists
removes an access list
Named access lists
removes an access list
Lack of planning
removes an access list
Extended IP access lists
removes an access list
no access-list [list #]
removes an access list
Single host wildcard mask
removes an access list
Wildcard mask
removes an access list
Standard IP access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
Partial masking
built into the Cisco IOS; solve many problems associated with traffic flow and security
Access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
Named access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
Lack of planning
built into the Cisco IOS; solve many problems associated with traffic flow and security
Extended IP access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
no access-list [list #]
built into the Cisco IOS; solve many problems associated with traffic flow and security
Single host wildcard mask
built into the Cisco IOS; solve many problems associated with traffic flow and security
Wildcard mask
built into the Cisco IOS; solve many problems associated with traffic flow and security
Standard IP access lists
use names instead of numbers to identify themselves
Partial masking
use names instead of numbers to identify themselves
Access lists
use names instead of numbers to identify themselves
Named access lists
use names instead of numbers to identify themselves
Lack of planning
use names instead of numbers to identify themselves
Extended IP access lists
use names instead of numbers to identify themselves
no access-list [list #]
use names instead of numbers to identify themselves
Single host wildcard mask
use names instead of numbers to identify themselves
Wildcard mask
use names instead of numbers to identify themselves
Standard IP access lists
filter by source IP address, destination IP address, protocol type, and application port number
Partial masking
filter by source IP address, destination IP address, protocol type, and application port number
Access lists
filter by source IP address, destination IP address, protocol type, and application port number
Named access lists
filter by source IP address, destination IP address, protocol type, and application port number
Lack of planning
filter by source IP address, destination IP address, protocol type, and application port number
Extended IP access lists
filter by source IP address, destination IP address, protocol type, and application port number
no access-list [list #]
filter by source IP address, destination IP address, protocol type, and application port number
Single host wildcard mask
filter by source IP address, destination IP address, protocol type, and application port number
Wildcard mask
filter by source IP address, destination IP address, protocol type, and application port number
Standard IP access lists
permit or deny packets based only on the source address
Partial masking
permit or deny packets based only on the source address
Access lists
permit or deny packets based only on the source address
Named access lists
permit or deny packets based only on the source address
Lack of planning
permit or deny packets based only on the source address
Extended IP access lists
permit or deny packets based only on the source address
no access-list [list #]
permit or deny packets based only on the source address
Single host wildcard mask
permit or deny packets based only on the source address
Wildcard mask
permit or deny packets based only on the source address
Standard IP access lists
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.