Deck 10: Access Lists
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 10: Access Lists
1
Regarding extended IP access lists, the ____ keyword is short for a wildcard mask of 0.0.0.0.
A) host
B) any
C) none
D) all
A) host
B) any
C) none
D) all
A
2
If you create and apply the lists and they have the intended results, you can cancel the scheduled reload with the ____ command.
A) reload 0
B) reload abort
C) reload cancel
D) reload off
A) reload 0
B) reload abort
C) reload cancel
D) reload off
C
3
To apply the inbound access list 1 to an interface, you use the following command: ____.
A) ip access-group 1 out
B) ip access-group 1 int
C) ip access-group 1 ext
D) ip access-group 1 in
A) ip access-group 1 out
B) ip access-group 1 int
C) ip access-group 1 ext
D) ip access-group 1 in
D
4
It is possible to replace the 0.0.0.0 255.255.255.255 entry, which represents all hosts and all networks, with the ____ keyword.
A) all
B) any
C) each
D) none
A) all
B) any
C) each
D) none
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Access lists begin working the second they are applied to an interface.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
With the ____ command, an administrator can schedule the router to reload in a certain number of minutes, hours, or even days.
A) interval
B) refresh
C) restart
D) reload
A) interval
B) refresh
C) restart
D) reload
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
To name a standard IP access list, use the following syntax: ____ .
A) ip access-list named [name]
B) named access-list standard [name]
C) ip access-list standard [name]
D) ip named-access-list [name]
A) ip access-list named [name]
B) named access-list standard [name]
C) ip access-list standard [name]
D) ip named-access-list [name]
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
With careful planning, you can create access lists that control which traffic crosses particular links, and which segments of your network will have access to others.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
The following command sets an outbound access list filter: ____.
A) ip access-group 1 ext
B) ip access-group 1 out
C) ip access-group 1 int
D) ip access-group 1 in
A) ip access-group 1 ext
B) ip access-group 1 out
C) ip access-group 1 int
D) ip access-group 1 in
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
To view which interfaces have IP access lists set, use the ____ command.
A) show ip in
B) show ip out
C) show ip interface
D) show ip any
A) show ip in
B) show ip out
C) show ip interface
D) show ip any
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
To remove an extended IP access list from an interface, you enter interface configuration mode and use the ____ command.
A) no ip ext access-group [list #] [in|out]
B) extended no ip access-group [list #] [in|out]
C) no ext access-group [list #] [in|out]
D) no ip access-group [list #] [in|out]
A) no ip ext access-group [list #] [in|out]
B) extended no ip access-group [list #] [in|out]
C) no ext access-group [list #] [in|out]
D) no ip access-group [list #] [in|out]
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
You must use the ____ command to save the list after configuration if you want it to survive a router reload.
A) copy reload
B) copy start on
C) copy run start
D) copy run reload
A) copy reload
B) copy start on
C) copy run start
D) copy run reload
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
To view the access lists defined on your router, use the ____ command.
A) show access-lists
B) show lists
C) display access-lists
D) access-lists show
A) show access-lists
B) show lists
C) display access-lists
D) access-lists show
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Smart network engineers pay close attention to network traffic flow and security when they design and manage their networks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
You can remove individual lines in an access list.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Access lists can take the place of more advanced security measures, such as firewalls.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
When making changes, you must remove the access list, using the ____ command.
A) no access-list [list number]
B) access-list off [list number]
C) off access-list [list number]
D) access-list [list number] no
A) no access-list [list number]
B) access-list off [list number]
C) off access-list [list number]
D) access-list [list number] no
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Use the ____ command to remove the application of the list.
A) no accessgroup [ip][list #][direction]
B) no ip [accessgroup][list #][direction]
C) no ip access-list [list #][direction]
D) no ip access-group [list #][direction]
A) no accessgroup [ip][list #][direction]
B) no ip [accessgroup][list #][direction]
C) no ip access-list [list #][direction]
D) no ip access-group [list #][direction]
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
Routers use ____ to determine which bits in an address will be significant.
A) wildcard masks
B) access masks
C) list numbers
D) address rules
A) wildcard masks
B) access masks
C) list numbers
D) address rules
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Traffic coming in to "the man in the router," through any of the interfaces, needs to be filtered using ____ traffic filters.
A) outgoing
B) incoming
C) exterior
D) outbound
A) outgoing
B) incoming
C) exterior
D) outbound
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Traffic coming in to the "man in the router," through any of the interfaces, is considered ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
The configuration of a(n) ____ is the main difference between the Basic and Advance firewall wizards.
A) NAT server
B) DMZ
C) intranet
D) proxy server
A) NAT server
B) DMZ
C) intranet
D) proxy server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
The access list ends with an implicit ____________________ statement, which blocks all packets that do not meet the requirements of the access list.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
What are the rules all access lists follow?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
What are some of the advantages of using named access lists?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Unlike the CLI, the SDM does allow a router to be configured as a firewall. To begin this task, click the ____ icon in the Tasks panel.
A) Firewall and ACL
B) Security Audit
C) Routing
D) NAT
A) Firewall and ACL
B) Security Audit
C) Routing
D) NAT
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
____ provides a GUI-based configuration tool for Cisco devices.
A) CLI
B) SDM
C) CCL
D) ACL
A) CLI
B) SDM
C) CCL
D) ACL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
To name an extended IP access list, use the following syntax: ____ .
A) extended ip named-access-list [name]
B) ip access-list extended [name]
C) named-access-list extended [name]
D) ip access-list named [name]
A) extended ip named-access-list [name]
B) ip access-list extended [name]
C) named-access-list extended [name]
D) ip access-list named [name]
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Describe each element of the extended IP access list configuration syntax.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
____________________ are permit or deny statements that filter traffic based on the source address, destination address, protocol type, and port number of a packet.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Describe each element of the standard IP access list configuration syntax.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
To apply a standard IP named list to an interface, use the following syntax: ____ .
A) ip standard access-group [name] [in | out]
B) ip standard-group [name] [in | out]
C) ip apply access-group [name] [in | out]
D) ip access-group [name] [in | out]
A) ip standard access-group [name] [in | out]
B) ip standard-group [name] [in | out]
C) ip apply access-group [name] [in | out]
D) ip access-group [name] [in | out]
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Why should you use a text editor to create access lists?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Where should you place standard and extended IP access lists?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
How can you monitor standard IP access lists?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
____________________ IP access lists filter network traffic based on the source IP address only.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Access lists to block a router's outward delivery must be applied as ____________________ filters.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
How can you monitor extended IP access lists?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
SDM allows you to easily create a standard or an extended access list or, as it is known in the SDM, a(n) ____.
A) VTY
B) TTY
C) ACL
D) CLI
A) VTY
B) TTY
C) ACL
D) CLI
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Briefly describe wildcard masks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What kind of tasks can you perform on the SDM's Interfaces and Connection screen?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck