When using access lists, what does a Cisco router check first?

A. To see if the packet is routable or bridgeable

B. The destination address

C. The source address

D. The packet contents



When using access lists, what does a Cisco router check first? A. To see if the packet is routabl..

Answer / guest

Answer: A

The first thing checked is to see if the packet is routable or

bridgeable. If it is not, the packet will be dropped.

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which NetWare protocol works on layer 3--network layer--of the OSI model? A. IPX B. NCP C. SPX D. NetBIOS

1 Answers  


What is the attenuation?

0 Answers  


What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

1 Answers  


The following commands were entered at the command prompt of a Cisco router. What do they accomplish? access-list 1000 deny 9e.1234.5678.1212 4 access-list 1000 permit -1 interface ethernet 0 ipx network 9e interface ethernet 1 ipx network 4a interface serial 0 ipx network 1 ipx output-sap-filter 1000 A. File server advertisements from server 9e.1234.5678.1212 will not be forwarded on interface S0. B. All other SAP services, other than file server, from any source will be forwarded on S0. C. All other SAP services, other than print server, from any source will be forwarded on S0. D. Print server advertisements from server 9e.1234.5678.1212 will not be forwarded on interface S0.

1 Answers  


What are the two most common request/reply pair with ICMP messages when using the ping command? (Choose two) A. echo reply B. echo request C. source quench D. fragment onset E. information redirect F. destination reachable G. echo control message

1 Answers  






What is difference between Store-and-Forward, cut-through, Fragment-Free Method?

2 Answers   HCL, Microsoft,


Which layer allows multiple Ethernet devices to uniquely identify one another on the Datalink layer? A.) Transport B.) Session C.) Network D.) Datalink - MAC Sublayer E.) Datalink - LLC Sublayer

3 Answers  


Why OSPF uses 2 Multicast IP

2 Answers  


What information can you get from CDP info: (choose all that apply) A.) Hardware platform B.) One address per protocol C.) Software platform D.) Hostname E.) The same info as show version F.) Incoming/outgoing port

1 Answers  


Identify the command mode necessary to enter the standard ping command? A.) Router(config)# B.) Router> C.) Router(std-ping)# D.) Router(config-if)#

2 Answers  


Identify 2 HDLC characteristics? A.) Default serial encapsulation B.) Open standard C.) Supports Stacker compression D.) Supports point-to-point and multipoint

3 Answers  


What is the passive topology in ccna?

0 Answers  


Categories