SlideShare uma empresa Scribd logo
1 de 8
Chapter 10

            True/False
            Indicate whether the statement is true or false.

____    1. Smart network engineers pay close attention to network traffic flow and security when they design and man-
           age their networks.

____    2. With careful planning, you can create access lists that control which traffic crosses particular links, and which
           segments of your network will have access to others.

____    3. Access lists can take the place of more advanced security measures, such as firewalls.

____    4. Access lists begin working the second they are applied to an interface.

____    5. You can remove individual lines in an access list.


            Multiple Choice
            Identify the choice that best completes the statement or answers the question.

____    6. When making changes, you must remove the access list, using the ____ command.
           a. no access-list [list number]
           b. access-list off [list number]
           c. off access-list [list number]
           d. access-list [list number] no
____    7. With the ____ command, an administrator can schedule the router to reload in a certain number of minutes,
           hours, or even days.
           a. interval                                  c. restart
           b. refresh                                   d. reload
____    8. If you create and apply the lists and they have the intended results, you can cancel the scheduled reload with
           the ____ command.
           a. reload 0                                       c. reload cancel
           b.  reload abort                                  d. reload off
____    9. Traffic coming in to “the man in the router,” through any of the interfaces, needs to be filtered using ____
           traffic filters.
           a. outgoing                                      c. exterior
           b. incoming                                      d. outbound
____ 10. To apply the inbound access list 1 to an interface, you use the following command: ____.
         a. ip access-group 1 out                         c. ip access-group 1 ext
         b. ip access-group 1 int                         d. ip access-group 1 in
____ 11. The following command sets an outbound access list filter: ____.
         a. ip access-group 1 ext                    c. ip access-group 1 int
         b. ip access-group 1 out                    d. ip access-group 1 in
____ 12. You must use the ____ command to save the list after configuration if you want it to survive a router reload.
         a. copy reload                               c. copy run start
b. copy start on                                d. copy run reload
____ 13. Routers use ____ to determine which bits in an address will be significant.
         a. wildcard masks                              c. list numbers
         b. access masks                                d. address rules
____ 14. It is possible to replace the 0.0.0.0 255.255.255.255 entry, which represents all hosts and all networks, with
         the ____ keyword.
         a. all                                            c. each
         b. any                                            d. none
____ 15. To view the access lists defined on your router, use the ____ command.
         a. show access-lists                             c. display access-lists
         b.  show lists                                   d. access-lists show
____ 16. To view which interfaces have IP access lists set, use the ____ command.
         a. show ip in                                   c. show ip interface
         b. show ip out                                  d. show ip any
____ 17. Use the ____ command to remove the application of the list.
         a. no accessgroup [ip][list #][direction]
         b. no ip [accessgroup][list #][direction]
         c. no ip access-list [list #][direction]
         d. no ip access-group [list #][direction]
____ 18. Regarding extended IP access lists, the ____ keyword is short for a wildcard mask of 0.0.0.0.
         a. host                                        c. none
         b. any                                         d. all
____ 19. To remove an extended IP access list from an interface, you enter interface configuration mode and use the
         ____ command.
         a. no ip ext access-group [list #] [in|out]
         b. extended no ip access-group [list #] [in|out]
         c. no ext access-group [list #] [in|out]
         d. no ip access-group [list #] [in|out]
____ 20. To name a standard IP access list, use the following syntax: ____.
         a. ip access-list named [name]
         b. named access-list standard [name]
         c. ip access-list standard [name]
         d. ip named-access-list [name]
____ 21. To name an extended IP access list, use the following syntax: ____.
         a. extended ip named-access-list [name]
         b. ip access-list extended [name]
         c. named-access-list extended [name]
         d. ip access-list named [name]
____ 22. To apply a standard IP named list to an interface, use the following syntax: ____.
         a. ip standard access-group [name] [in | out]
         b. ip standard-group [name] [in | out]
         c. ip apply access-group [name] [in | out]
         d. ip access-group [name] [in | out]
____ 23. ____ provides a GUI-based configuration tool for Cisco devices.
         a. CLI                                        c. CCL
         b. SDM                                        d. ACL
____ 24. SDM allows you to easily create a standard or an extended access list or, as it is known in the SDM, a(n)
         ____.
         a. VTY                                         c. ACL
         b. TTY                                         d. CLI
____ 25. Unlike the CLI, the SDM does allow a router to be configured as a firewall. To begin this task, click the ____
         icon in the Tasks panel.
         a. Firewall and ACL                           c. Routing
         b. Security Audit                             d. NAT
____ 26. The configuration of a(n) ____ is the main difference between the Basic and Advance firewall wizards.
         a. NAT server                                   c. intranet
         b. DMZ                                          d. proxy server


           Completion
           Complete each statement.

      27. ____________________ are permit or deny statements that filter traffic based on the source address, destina-
          tion address, protocol type, and port number of a packet.

      28. The access list ends with an implicit ____________________ statement, which blocks all packets that do not
          meet the requirements of the access list.

      29. Traffic coming in to the “man in the router,” through any of the interfaces, is considered
          ____________________.

      30. Access lists to block a router’s outward delivery must be applied as ____________________ filters.

      31. ____________________ IP access lists filter network traffic based on the source IP address only.


           Matching

           Match each item with a statement below:
           a. Access lists                                 f.   Standard IP access lists
           b. Lack of planning                             g.   Extended IP access lists
           c. no access-list [list #]                      h.   Named access lists
           d. Wildcard mask                                i.   Single host wildcard mask
           e. Partial masking
____ 32. permit or deny packets based only on the source address
____ 33. the mixing of 0s and 1s in a wildcard mask octet
____ 34. built into the Cisco IOS; solve many problems associated with traffic flow and security
____ 35. use names instead of numbers to identify themselves
____ 36. one of the most common problems associated with access lists
____ 37. filter by source IP address, destination IP address, protocol type, and application port number
____ 38. removes an access list
____ 39. the default for standard IP access lists
____ 40. determines which bits of the source address are significant


            Short Answer

       41. Why should you use a text editor to create access lists?

       42. What are the rules all access lists follow?

       43. Describe each element of the standard IP access list configuration syntax.

       44. Briefly describe wildcard masks.

       45. How can you monitor standard IP access lists?

       46. Describe each element of the extended IP access list configuration syntax.

       47. Where should you place standard and extended IP access lists?

       48. How can you monitor extended IP access lists?

       49. What are some of the advantages of using named access lists?
50. What kind of tasks can you perform on the SDM’s Interfaces and Connection screen?
      Chapter 10
      Answer Section

      TRUE/FALSE

 1.   ANS:   T           PTS:   1             REF:   260
 2.   ANS:   T           PTS:   1             REF:   261
 3.   ANS:   F           PTS:   1             REF:   261
 4.   ANS:   T           PTS:   1             REF:   261
 5.   ANS:   F           PTS:   1             REF:   263


      MULTIPLE CHOICE

 6.   ANS:   A           PTS:   1             REF:   261
 7.   ANS:   D           PTS:   1             REF:   261
 8.   ANS:   C           PTS:   1             REF:   262
 9.   ANS:   B           PTS:   1             REF:   263
10.   ANS:   D           PTS:   1             REF:   263
11.   ANS:   B           PTS:   1             REF:   263
12.   ANS:   C           PTS:   1             REF:   264
13.   ANS:   A           PTS:   1             REF:   265
14.   ANS:   B           PTS:   1             REF:   269
15.   ANS:   A           PTS:   1             REF:   269
16.   ANS:   C           PTS:   1             REF:   269
17.   ANS:   D           PTS:   1             REF:   273
18.   ANS:   A           PTS:   1             REF:   275
19.   ANS:   D           PTS:   1             REF:   277
20.   ANS:   C           PTS:   1             REF:   279
21.   ANS:   B           PTS:   1             REF:   279
22.   ANS:   D           PTS:   1             REF:   279
23.   ANS:   B           PTS:   1             REF:   280
24.   ANS:   C           PTS:   1             REF:   280
25.   ANS:   A           PTS:   1             REF:   286
26.   ANS:   B           PTS:   1             REF:   286


      COMPLETION

27. ANS: Access lists

    PTS: 1               REF: 260
28. ANS: deny any

    PTS: 1               REF: 260
29. ANS: inbound
PTS: 1                  REF: 263
30. ANS: outbound

    PTS: 1                  REF: 263
31. ANS: Standard

      PTS: 1                REF: 265


      MATCHING

32.   ANS:   F              PTS:   1               REF:   268
33.   ANS:   E              PTS:   1               REF:   266
34.   ANS:   A              PTS:   1               REF:   260
35.   ANS:   H              PTS:   1               REF:   279
36.   ANS:   B              PTS:   1               REF:   261
37.   ANS:   G              PTS:   1               REF:   273
38.   ANS:   C              PTS:   1               REF:   263
39.   ANS:   I              PTS:   1               REF:   279
40.   ANS:   D              PTS:   1               REF:   265


      SHORT ANSWER

41. ANS:
    To ease the administrative load associated with access lists, Cisco recommends using a text editor to create
    them. You can then easily make changes to the list and apply it to the router configuration using copy and
    paste. You should place a no access-list [list #] command as the first line of the text file, which
    allows you to completely remove an access list from a router. If you do not use this command, the lines of the
    access list in the text file will be appended to the end of the existing list when you paste it into the configura-
    tion.

    PTS: 1                  REF: 263
42. ANS:
    In summary, all access lists follow these rules:
    • Routers apply lists sequentially in the order in which you type them into the router.
    • Routers apply lists to packets sequentially, from the top down, one line at a time.
    • Packets are processed only until a match is made, and then they are acted upon based on the access list crite-
    ria contained in access list statements.
    • Lists always end with an implicit deny. Routers discard any packets that do not match any of the access
    list statements.
    • Access lists must be applied to an interface as either inbound or outbound traffic filters.
    • Only one list, per protocol, per direction can be applied to an interface.
    • Access lists are effective as soon as they are applied; however, you must use the copy run start com-
    mand to save the list after configuration if you want it to survive a router reload.

    PTS: 1               REF: 264
43. ANS:
    To configure standard IP access lists, you must create the list and then apply it to an interface using the fol-
    lowing syntax:
access-list [list #] [permit|deny] [source address] [source wildcard
     mask]

     The brackets in each command syntax are not part of the command; they group items that
     are replaced within each specific entry. The following list explains each element of the
     standard IP access list configuration syntax:
     • [list #]—Standard IP access lists are represented by a number in the range of 1–99 (in IOS versions 11.2 and
     greater, they can also be represented by text names).
     • [permit|deny]—Used to specify the nature of the access list line. It is either a permit or a deny statement.
     • [source address]—The IP address of the source.
     • [source wildcard mask]—A wildcard mask, or inverse mask, applied to determine which bits of the source
     address are significant.

    PTS: 1                  REF: 265
44. ANS:
    Wildcard masks are one of the most important concepts in IP access lists. Routers use them to determine
    which bits in an address will be significant. Unlike subnet masks, 0s are placed in bit positions deemed signif-
    icant, and 1s are placed in positions that are not significant. In other words, where there is a 0 in the mask, the
    corresponding bit in the incoming packet (either 0 or 1) must match the bit in the IP address in the access list.
    If there is no match, the packet passes to the next line in the access list.

    PTS: 1                   REF: 265
45. ANS:
    Three main commands are available for monitoring access lists on your router. The first two, show ac-
    cess-lists and show ip access-lists, display the exact syntax of all access lists and IP access
    lists, respectively. The show interfaces or show ip interface command is used to verify that
    an access list has been successfully applied to an interface. It is a good idea to run each of these commands af-
    ter creating and applying access lists, to visually inspect and verify that statements were typed correctly and
    that the lists will function as entered. Use the no access-list [list #] command to remove the list
    and the no ip access-group [list #][direction] command to remove the application of the
    list.

    PTS: 1                 REF: 273
46. ANS:
    To configure extended IP access lists, you must create the list and then apply it to an interface using the fol-
    lowing syntax. A detailed explanation of each element follows the example.
    access-list [list #] [permit|deny] [protocol] [source IP address] [source wildcard mask] [operator] [port]
    [destination IP address] [destination wildcard mask] [operator] [port] [log]
    • [list #]—Extended IP access lists are represented by a number in the range of 100–199 (in IOS versions 11.2
    and greater, they can also be represented by text names).
    • [permit|deny]—Used to specify the nature of the access list line. It is either a permit or a deny statement.
    • [protocol]—The IP protocol to be filtered can be IP (which includes all protocols in the TCP/IP suite), TCP,
    UDP, ICMP, or others.
    • [source IP address]—The IP address of the source.
    • [source wildcard mask]—A wildcard mask, or inverse mask, applied to determine which bits of the source
    address are significant.
    • [destination IP address]—The IP address of the destination.
    • [destination wildcard mask]—A wildcard mask, or inverse mask, applied to determine which bits of the des-
    tination address are significant.
• [operator]—Can contain lt (less than), gt (greater than), eq (equal to), or neq (not equal to). It is used
     if an extended list filters by a specific port number.
     • [port]—If necessary, the port number of the protocol to be filtered. Alternatively, a service using TCP, such
     as www or ftp, can be specified.
     • [log]—Turns on logging of access list activity.

    PTS: 1                 REF: 273-274
47. ANS:
    Once an extended IP access list is created, it must be applied to an interface, just like a standard list. The dif-
    ference is the placement of the list. Standard IP access lists examine the source address only. As a result, you
    must place them as close to the destination as possible to avoid blocking traffic bound for another interface or
    network. On the other hand, extended IP access lists are able to filter based on source and destination. There-
    fore, they are placed as close to the source as possible.

    PTS: 1                REF: 277
48. ANS:
    The same commands used to monitor standard IP access lists are used to monitor extended IP access lists. If
    you want to view the access lists configured on your router, you use the show access-lists or show
    ip access-lists command. To see if the list has been applied to an interface, use the show inter-
    faces or show ip interface command.

     Extended IP lists keep track of the number of packets that pass each line of an access list. These matches or
     counters can be reset to zero for troubleshooting purposes. The clear access-list counters [list
     #] command clears the counters. The no access-list [list#] command removes the list and the no ip
     access-group [list#] [direction] command removes the application of the list.

    PTS: 1                  REF: 278
49. ANS:
    The naming feature allows you to maintain security by using an easily identifiable access list. It also removes
    the limit of 100 lists per filter type. In addition, with named access lists lines can be selectively deleted in the
    ACL. This feature does not allow you to add lines to the ACL; any lines added to a named ACL are applied to
    the end of the list. Named ACLs provide greater flexibility to network administrators who work in environ-
    ments where large numbers of ACLs are needed, such as a large ISP.

    PTS: 1                 REF: 279
50. ANS:
    On the Interfaces and Connection screen, you can perform tasks related to:
    • Interfaces and Connections
    • Firewall and ACL
    • VPN
    • Security Audit
    • Routing
    • NAT
    • Intrusion Prevention
    • Quality of Service
    • NAC
    • Additional Tasks

     PTS: 1                 REF: 281

Mais conteúdo relacionado

Mais procurados

Switch configuration
Switch configurationSwitch configuration
Switch configurationMuuluu
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)NetProtocol Xpert
 
Cisco CCNA IP SLA with tracking configuration
Cisco CCNA IP SLA  with tracking  configurationCisco CCNA IP SLA  with tracking  configuration
Cisco CCNA IP SLA with tracking configurationHamed Moghaddam
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocolSanthosh Somu
 
Cisco vs. huawei CLI Commands
Cisco vs. huawei CLI CommandsCisco vs. huawei CLI Commands
Cisco vs. huawei CLI CommandsBootcamp SCL
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
Access Control List & its Types
Access Control List & its TypesAccess Control List & its Types
Access Control List & its TypesNetwax Lab
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7Nil Menon
 
Huawei switch configuration commands
Huawei switch configuration commandsHuawei switch configuration commands
Huawei switch configuration commandsHuanetwork
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2Nil Menon
 
Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)William Lee
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP QuestionsDsunte Wilson
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyVuz Dở Hơi
 
Ncat ccna cheat sheet
Ncat ccna cheat sheetNcat ccna cheat sheet
Ncat ccna cheat sheetEZREIG OMAR
 

Mais procurados (20)

Switch configuration
Switch configurationSwitch configuration
Switch configuration
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
 
Cisco CCNA IP SLA with tracking configuration
Cisco CCNA IP SLA  with tracking  configurationCisco CCNA IP SLA  with tracking  configuration
Cisco CCNA IP SLA with tracking configuration
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocol
 
Cisco vs. huawei CLI Commands
Cisco vs. huawei CLI CommandsCisco vs. huawei CLI Commands
Cisco vs. huawei CLI Commands
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
Access Control List & its Types
Access Control List & its TypesAccess Control List & its Types
Access Control List & its Types
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
Huawei switch configuration commands
Huawei switch configuration commandsHuawei switch configuration commands
Huawei switch configuration commands
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
 
Network design
Network designNetwork design
Network design
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
 
Ncat ccna cheat sheet
Ncat ccna cheat sheetNcat ccna cheat sheet
Ncat ccna cheat sheet
 

Destaque

Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Sarmad Ali
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Dsunte Wilson
 
Packet Tracer 101 course
Packet Tracer 101 coursePacket Tracer 101 course
Packet Tracer 101 courseKenan Spahi
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer OverviewAli Usman
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsDsunte Wilson
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideIT Tech
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction Dsunte Wilson
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...Dsunte Wilson
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certificationdkaya
 
Technical interview questions -networking
Technical interview questions -networkingTechnical interview questions -networking
Technical interview questions -networkingrafiq123
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumpsslotiopo
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bullsSwapnil Kapate
 
Ccna cheat sheet
Ccna cheat sheetCcna cheat sheet
Ccna cheat sheetaromal4frnz
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsDsunte Wilson
 

Destaque (18)

Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
Packet Tracer 101 course
Packet Tracer 101 coursePacket Tracer 101 course
Packet Tracer 101 course
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer Overview
 
Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
 
Technical interview questions -networking
Technical interview questions -networkingTechnical interview questions -networking
Technical interview questions -networking
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumps
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
 
Ccna cheat sheet
Ccna cheat sheetCcna cheat sheet
Ccna cheat sheet
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 

Semelhante a CCNA Access Lists Questions

CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsDsunte Wilson
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services QuestionsDsunte Wilson
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsDsunte Wilson
 
CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices QuestionsDsunte Wilson
 
2017 ofi-hoti-tutorial
2017 ofi-hoti-tutorial2017 ofi-hoti-tutorial
2017 ofi-hoti-tutorialseanhefty
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02Shu Shin
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02Shu Shin
 
Asibul Ahsan(063473056)
Asibul Ahsan(063473056)Asibul Ahsan(063473056)
Asibul Ahsan(063473056)mashiur
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 testSoporte Yottatec
 
i need this done in one hourQ1. I.docx
i need this done in one hourQ1. I.docxi need this done in one hourQ1. I.docx
i need this done in one hourQ1. I.docxevontdcichon
 
LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx
LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docxLAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx
LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docxcroysierkathey
 
Cisco labs practical4
Cisco labs practical4Cisco labs practical4
Cisco labs practical4Tai Lam
 
Samples of competitive examination questions: part II
Samples of competitive examination questions: part IISamples of competitive examination questions: part II
Samples of competitive examination questions: part IIAli I. Al-Mosawi
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxgalerussel59292
 
chapter3 evemt handling and delighted model java mcq important mcq for 2023
chapter3 evemt handling and delighted model java mcq important mcq for 2023chapter3 evemt handling and delighted model java mcq important mcq for 2023
chapter3 evemt handling and delighted model java mcq important mcq for 2023bhagatsadesh96
 
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
Lab8  Controlling traffic using Extended ACL Objectives Per.pdfLab8  Controlling traffic using Extended ACL Objectives Per.pdf
Lab8 Controlling traffic using Extended ACL Objectives Per.pdfadityacommunication1
 
Cmit 321 final exam new spring 2016
Cmit 321 final exam new  spring 2016 Cmit 321 final exam new  spring 2016
Cmit 321 final exam new spring 2016 oking2777
 
Cmit 321 final exam new spring 2016
Cmit 321 final exam new  spring 2016 Cmit 321 final exam new  spring 2016
Cmit 321 final exam new spring 2016 andrey_milev
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsDsunte Wilson
 

Semelhante a CCNA Access Lists Questions (20)

CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
 
CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices Questions
 
2017 ofi-hoti-tutorial
2017 ofi-hoti-tutorial2017 ofi-hoti-tutorial
2017 ofi-hoti-tutorial
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02
 
Asibul Ahsan(063473056)
Asibul Ahsan(063473056)Asibul Ahsan(063473056)
Asibul Ahsan(063473056)
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 test
 
i need this done in one hourQ1. I.docx
i need this done in one hourQ1. I.docxi need this done in one hourQ1. I.docx
i need this done in one hourQ1. I.docx
 
LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx
LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docxLAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx
LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx
 
Cisco labs practical4
Cisco labs practical4Cisco labs practical4
Cisco labs practical4
 
Samples of competitive examination questions: part II
Samples of competitive examination questions: part IISamples of competitive examination questions: part II
Samples of competitive examination questions: part II
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
 
chapter3 evemt handling and delighted model java mcq important mcq for 2023
chapter3 evemt handling and delighted model java mcq important mcq for 2023chapter3 evemt handling and delighted model java mcq important mcq for 2023
chapter3 evemt handling and delighted model java mcq important mcq for 2023
 
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
Lab8  Controlling traffic using Extended ACL Objectives Per.pdfLab8  Controlling traffic using Extended ACL Objectives Per.pdf
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
 
Cmit 321 final exam new spring 2016
Cmit 321 final exam new  spring 2016 Cmit 321 final exam new  spring 2016
Cmit 321 final exam new spring 2016
 
Cmit 321 final exam new spring 2016
Cmit 321 final exam new  spring 2016 Cmit 321 final exam new  spring 2016
Cmit 321 final exam new spring 2016
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
 

Mais de Dsunte Wilson

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 

Mais de Dsunte Wilson (14)

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 

Último

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

CCNA Access Lists Questions

  • 1. Chapter 10 True/False Indicate whether the statement is true or false. ____ 1. Smart network engineers pay close attention to network traffic flow and security when they design and man- age their networks. ____ 2. With careful planning, you can create access lists that control which traffic crosses particular links, and which segments of your network will have access to others. ____ 3. Access lists can take the place of more advanced security measures, such as firewalls. ____ 4. Access lists begin working the second they are applied to an interface. ____ 5. You can remove individual lines in an access list. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. When making changes, you must remove the access list, using the ____ command. a. no access-list [list number] b. access-list off [list number] c. off access-list [list number] d. access-list [list number] no ____ 7. With the ____ command, an administrator can schedule the router to reload in a certain number of minutes, hours, or even days. a. interval c. restart b. refresh d. reload ____ 8. If you create and apply the lists and they have the intended results, you can cancel the scheduled reload with the ____ command. a. reload 0 c. reload cancel b. reload abort d. reload off ____ 9. Traffic coming in to “the man in the router,” through any of the interfaces, needs to be filtered using ____ traffic filters. a. outgoing c. exterior b. incoming d. outbound ____ 10. To apply the inbound access list 1 to an interface, you use the following command: ____. a. ip access-group 1 out c. ip access-group 1 ext b. ip access-group 1 int d. ip access-group 1 in ____ 11. The following command sets an outbound access list filter: ____. a. ip access-group 1 ext c. ip access-group 1 int b. ip access-group 1 out d. ip access-group 1 in ____ 12. You must use the ____ command to save the list after configuration if you want it to survive a router reload. a. copy reload c. copy run start
  • 2. b. copy start on d. copy run reload ____ 13. Routers use ____ to determine which bits in an address will be significant. a. wildcard masks c. list numbers b. access masks d. address rules ____ 14. It is possible to replace the 0.0.0.0 255.255.255.255 entry, which represents all hosts and all networks, with the ____ keyword. a. all c. each b. any d. none ____ 15. To view the access lists defined on your router, use the ____ command. a. show access-lists c. display access-lists b. show lists d. access-lists show ____ 16. To view which interfaces have IP access lists set, use the ____ command. a. show ip in c. show ip interface b. show ip out d. show ip any ____ 17. Use the ____ command to remove the application of the list. a. no accessgroup [ip][list #][direction] b. no ip [accessgroup][list #][direction] c. no ip access-list [list #][direction] d. no ip access-group [list #][direction] ____ 18. Regarding extended IP access lists, the ____ keyword is short for a wildcard mask of 0.0.0.0. a. host c. none b. any d. all ____ 19. To remove an extended IP access list from an interface, you enter interface configuration mode and use the ____ command. a. no ip ext access-group [list #] [in|out] b. extended no ip access-group [list #] [in|out] c. no ext access-group [list #] [in|out] d. no ip access-group [list #] [in|out] ____ 20. To name a standard IP access list, use the following syntax: ____. a. ip access-list named [name] b. named access-list standard [name] c. ip access-list standard [name] d. ip named-access-list [name] ____ 21. To name an extended IP access list, use the following syntax: ____. a. extended ip named-access-list [name] b. ip access-list extended [name] c. named-access-list extended [name] d. ip access-list named [name] ____ 22. To apply a standard IP named list to an interface, use the following syntax: ____. a. ip standard access-group [name] [in | out] b. ip standard-group [name] [in | out] c. ip apply access-group [name] [in | out] d. ip access-group [name] [in | out]
  • 3. ____ 23. ____ provides a GUI-based configuration tool for Cisco devices. a. CLI c. CCL b. SDM d. ACL ____ 24. SDM allows you to easily create a standard or an extended access list or, as it is known in the SDM, a(n) ____. a. VTY c. ACL b. TTY d. CLI ____ 25. Unlike the CLI, the SDM does allow a router to be configured as a firewall. To begin this task, click the ____ icon in the Tasks panel. a. Firewall and ACL c. Routing b. Security Audit d. NAT ____ 26. The configuration of a(n) ____ is the main difference between the Basic and Advance firewall wizards. a. NAT server c. intranet b. DMZ d. proxy server Completion Complete each statement. 27. ____________________ are permit or deny statements that filter traffic based on the source address, destina- tion address, protocol type, and port number of a packet. 28. The access list ends with an implicit ____________________ statement, which blocks all packets that do not meet the requirements of the access list. 29. Traffic coming in to the “man in the router,” through any of the interfaces, is considered ____________________. 30. Access lists to block a router’s outward delivery must be applied as ____________________ filters. 31. ____________________ IP access lists filter network traffic based on the source IP address only. Matching Match each item with a statement below: a. Access lists f. Standard IP access lists b. Lack of planning g. Extended IP access lists c. no access-list [list #] h. Named access lists d. Wildcard mask i. Single host wildcard mask e. Partial masking ____ 32. permit or deny packets based only on the source address ____ 33. the mixing of 0s and 1s in a wildcard mask octet ____ 34. built into the Cisco IOS; solve many problems associated with traffic flow and security ____ 35. use names instead of numbers to identify themselves ____ 36. one of the most common problems associated with access lists
  • 4. ____ 37. filter by source IP address, destination IP address, protocol type, and application port number ____ 38. removes an access list ____ 39. the default for standard IP access lists ____ 40. determines which bits of the source address are significant Short Answer 41. Why should you use a text editor to create access lists? 42. What are the rules all access lists follow? 43. Describe each element of the standard IP access list configuration syntax. 44. Briefly describe wildcard masks. 45. How can you monitor standard IP access lists? 46. Describe each element of the extended IP access list configuration syntax. 47. Where should you place standard and extended IP access lists? 48. How can you monitor extended IP access lists? 49. What are some of the advantages of using named access lists?
  • 5. 50. What kind of tasks can you perform on the SDM’s Interfaces and Connection screen? Chapter 10 Answer Section TRUE/FALSE 1. ANS: T PTS: 1 REF: 260 2. ANS: T PTS: 1 REF: 261 3. ANS: F PTS: 1 REF: 261 4. ANS: T PTS: 1 REF: 261 5. ANS: F PTS: 1 REF: 263 MULTIPLE CHOICE 6. ANS: A PTS: 1 REF: 261 7. ANS: D PTS: 1 REF: 261 8. ANS: C PTS: 1 REF: 262 9. ANS: B PTS: 1 REF: 263 10. ANS: D PTS: 1 REF: 263 11. ANS: B PTS: 1 REF: 263 12. ANS: C PTS: 1 REF: 264 13. ANS: A PTS: 1 REF: 265 14. ANS: B PTS: 1 REF: 269 15. ANS: A PTS: 1 REF: 269 16. ANS: C PTS: 1 REF: 269 17. ANS: D PTS: 1 REF: 273 18. ANS: A PTS: 1 REF: 275 19. ANS: D PTS: 1 REF: 277 20. ANS: C PTS: 1 REF: 279 21. ANS: B PTS: 1 REF: 279 22. ANS: D PTS: 1 REF: 279 23. ANS: B PTS: 1 REF: 280 24. ANS: C PTS: 1 REF: 280 25. ANS: A PTS: 1 REF: 286 26. ANS: B PTS: 1 REF: 286 COMPLETION 27. ANS: Access lists PTS: 1 REF: 260 28. ANS: deny any PTS: 1 REF: 260 29. ANS: inbound
  • 6. PTS: 1 REF: 263 30. ANS: outbound PTS: 1 REF: 263 31. ANS: Standard PTS: 1 REF: 265 MATCHING 32. ANS: F PTS: 1 REF: 268 33. ANS: E PTS: 1 REF: 266 34. ANS: A PTS: 1 REF: 260 35. ANS: H PTS: 1 REF: 279 36. ANS: B PTS: 1 REF: 261 37. ANS: G PTS: 1 REF: 273 38. ANS: C PTS: 1 REF: 263 39. ANS: I PTS: 1 REF: 279 40. ANS: D PTS: 1 REF: 265 SHORT ANSWER 41. ANS: To ease the administrative load associated with access lists, Cisco recommends using a text editor to create them. You can then easily make changes to the list and apply it to the router configuration using copy and paste. You should place a no access-list [list #] command as the first line of the text file, which allows you to completely remove an access list from a router. If you do not use this command, the lines of the access list in the text file will be appended to the end of the existing list when you paste it into the configura- tion. PTS: 1 REF: 263 42. ANS: In summary, all access lists follow these rules: • Routers apply lists sequentially in the order in which you type them into the router. • Routers apply lists to packets sequentially, from the top down, one line at a time. • Packets are processed only until a match is made, and then they are acted upon based on the access list crite- ria contained in access list statements. • Lists always end with an implicit deny. Routers discard any packets that do not match any of the access list statements. • Access lists must be applied to an interface as either inbound or outbound traffic filters. • Only one list, per protocol, per direction can be applied to an interface. • Access lists are effective as soon as they are applied; however, you must use the copy run start com- mand to save the list after configuration if you want it to survive a router reload. PTS: 1 REF: 264 43. ANS: To configure standard IP access lists, you must create the list and then apply it to an interface using the fol- lowing syntax:
  • 7. access-list [list #] [permit|deny] [source address] [source wildcard mask] The brackets in each command syntax are not part of the command; they group items that are replaced within each specific entry. The following list explains each element of the standard IP access list configuration syntax: • [list #]—Standard IP access lists are represented by a number in the range of 1–99 (in IOS versions 11.2 and greater, they can also be represented by text names). • [permit|deny]—Used to specify the nature of the access list line. It is either a permit or a deny statement. • [source address]—The IP address of the source. • [source wildcard mask]—A wildcard mask, or inverse mask, applied to determine which bits of the source address are significant. PTS: 1 REF: 265 44. ANS: Wildcard masks are one of the most important concepts in IP access lists. Routers use them to determine which bits in an address will be significant. Unlike subnet masks, 0s are placed in bit positions deemed signif- icant, and 1s are placed in positions that are not significant. In other words, where there is a 0 in the mask, the corresponding bit in the incoming packet (either 0 or 1) must match the bit in the IP address in the access list. If there is no match, the packet passes to the next line in the access list. PTS: 1 REF: 265 45. ANS: Three main commands are available for monitoring access lists on your router. The first two, show ac- cess-lists and show ip access-lists, display the exact syntax of all access lists and IP access lists, respectively. The show interfaces or show ip interface command is used to verify that an access list has been successfully applied to an interface. It is a good idea to run each of these commands af- ter creating and applying access lists, to visually inspect and verify that statements were typed correctly and that the lists will function as entered. Use the no access-list [list #] command to remove the list and the no ip access-group [list #][direction] command to remove the application of the list. PTS: 1 REF: 273 46. ANS: To configure extended IP access lists, you must create the list and then apply it to an interface using the fol- lowing syntax. A detailed explanation of each element follows the example. access-list [list #] [permit|deny] [protocol] [source IP address] [source wildcard mask] [operator] [port] [destination IP address] [destination wildcard mask] [operator] [port] [log] • [list #]—Extended IP access lists are represented by a number in the range of 100–199 (in IOS versions 11.2 and greater, they can also be represented by text names). • [permit|deny]—Used to specify the nature of the access list line. It is either a permit or a deny statement. • [protocol]—The IP protocol to be filtered can be IP (which includes all protocols in the TCP/IP suite), TCP, UDP, ICMP, or others. • [source IP address]—The IP address of the source. • [source wildcard mask]—A wildcard mask, or inverse mask, applied to determine which bits of the source address are significant. • [destination IP address]—The IP address of the destination. • [destination wildcard mask]—A wildcard mask, or inverse mask, applied to determine which bits of the des- tination address are significant.
  • 8. • [operator]—Can contain lt (less than), gt (greater than), eq (equal to), or neq (not equal to). It is used if an extended list filters by a specific port number. • [port]—If necessary, the port number of the protocol to be filtered. Alternatively, a service using TCP, such as www or ftp, can be specified. • [log]—Turns on logging of access list activity. PTS: 1 REF: 273-274 47. ANS: Once an extended IP access list is created, it must be applied to an interface, just like a standard list. The dif- ference is the placement of the list. Standard IP access lists examine the source address only. As a result, you must place them as close to the destination as possible to avoid blocking traffic bound for another interface or network. On the other hand, extended IP access lists are able to filter based on source and destination. There- fore, they are placed as close to the source as possible. PTS: 1 REF: 277 48. ANS: The same commands used to monitor standard IP access lists are used to monitor extended IP access lists. If you want to view the access lists configured on your router, you use the show access-lists or show ip access-lists command. To see if the list has been applied to an interface, use the show inter- faces or show ip interface command. Extended IP lists keep track of the number of packets that pass each line of an access list. These matches or counters can be reset to zero for troubleshooting purposes. The clear access-list counters [list #] command clears the counters. The no access-list [list#] command removes the list and the no ip access-group [list#] [direction] command removes the application of the list. PTS: 1 REF: 278 49. ANS: The naming feature allows you to maintain security by using an easily identifiable access list. It also removes the limit of 100 lists per filter type. In addition, with named access lists lines can be selectively deleted in the ACL. This feature does not allow you to add lines to the ACL; any lines added to a named ACL are applied to the end of the list. Named ACLs provide greater flexibility to network administrators who work in environ- ments where large numbers of ACLs are needed, such as a large ISP. PTS: 1 REF: 279 50. ANS: On the Interfaces and Connection screen, you can perform tasks related to: • Interfaces and Connections • Firewall and ACL • VPN • Security Audit • Routing • NAT • Intrusion Prevention • Quality of Service • NAC • Additional Tasks PTS: 1 REF: 281