Matching
Match each item with a statement below:
Premises:
determines which bits of the source address are significant
one of the most common problems associated with access lists
the mixing of 0s and 1s in a wildcard mask octet
the default for standard IP access lists
removes an access list
built into the Cisco IOS; solve many problems associated with traffic flow and security
use names instead of numbers to identify themselves
filter by source IP address, destination IP address, protocol type, and application port number
permit or deny packets based only on the source address
Responses:
Wildcard mask
no access-list [list #]
Extended IP access lists
Standard IP access lists
Access lists
Named access lists
Lack of planning
Single host wildcard mask
Partial masking
Correct Answer:
Premises:
Responses:
determines which bits of the source address are significant
one of the most common problems associated with access lists
the mixing of 0s and 1s in a wildcard mask octet
the default for standard IP access lists
removes an access list
built into the Cisco IOS; solve many problems associated with traffic flow and security
use names instead of numbers to identify themselves
filter by source IP address, destination IP address, protocol type, and application port number
permit or deny packets based only on the source address
Premises:
determines which bits of the source address are significant
one of the most common problems associated with access lists
the mixing of 0s and 1s in a wildcard mask octet
the default for standard IP access lists
removes an access list
built into the Cisco IOS; solve many problems associated with traffic flow and security
use names instead of numbers to identify themselves
filter by source IP address, destination IP address, protocol type, and application port number
permit or deny packets based only on the source address
Responses:
Related Questions
Q22: Access lists can take the place of
Q23: Access lists begin working the second they
Q24: _ are permit or deny statements that
Q25: With the _ command, an administrator can
Q26: Unlike the CLI, the SDM does allow
Q28: Traffic coming in to "the man in
Q29: Why should you use a text editor
Q30: It is possible to replace the 0.0.0.0
Q31: Describe each element of the extended IP
Q32: With careful planning, you can create access