What should be the first command to create an access-list that

prevents all users on subnetwork 10.10.128.0, using subnet mask

255.255.192.0, from being

able to telnet anywhere?

A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq
telnet

B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq
telnet

C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet

D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq
telnet

E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq
telnet

F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq
telnet

Answers were Sorted based on User's Feedback



What should be the first command to create an access-list that prevents all users on subnetwork 1..

Answer / tahir haider

access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
C:

Is This Answer Correct ?    5 Yes 1 No

What should be the first command to create an access-list that prevents all users on subnetwork 1..

Answer / shahin

Mr Tahir, Ur answer is wrong. As of no subnet mask is used
in ACL. It use WILD CARD MASK.

So correct answer wud be A.

access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq

Is This Answer Correct ?    1 Yes 1 No

What should be the first command to create an access-list that prevents all users on subnetwork 1..

Answer / guest

Answer: A

Is This Answer Correct ?    1 Yes 3 No

Post New Answer

More CCNA Interview Questions

What is cisco?

0 Answers  


If i had 400 computers set in a site how many VLAN i should configure so that i can share a proper bandwith,and also i had two lease line connection of 2Mbps each,

1 Answers   IBM,


Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) TCP

2 Answers  


How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain

1 Answers  


What does eq means?

0 Answers  






What is segmentation and fragmentation?

0 Answers  


The benefits to segmenting with Bridges are which of the following? A.) Scalability B.) Datagram filtering C.) Manageability D.) Reliability

1 Answers  


What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router

20 Answers   IBM,


Can you explain transport and tunnel mode in detail with datagram packets?

1 Answers   CCIE,


What is the virtual path?

0 Answers  


Why would you use static routing instead of dynamic routing? A.) When you want automatic updates of the routing tables B.) All the time C.) When you have very few routes and want to conserve bandwidth D.) When you have a gateway of last resort

1 Answers  


Why twist in twisted pairs?

0 Answers   HCL, Steria,


Categories