What do the following commands accomplish?
access-list 1 deny 172.16.4.0 0.0.0.255
access-list 1 permit any
interface ethernet 0
IP access-group 1 out
A. This will block traffic from subnet 172.16.4.0 and allow
all other
traffic.
B. This will allow traffic from subnet 172.16.4.0 and block
all other
traffic.
C. All traffic is allowed.
D. All traffic is blocked.
Answer / guest
Answer:: A
This will block traffic from subnet 172.16.4.0 and allow all
other
traffic. The first statement "access-list 1 deny 172.16.4.0
0.0.0.255"
will deny access to the subnet 172.16.4.0.
| Is This Answer Correct ? | 8 Yes | 0 No |
Given an IP host address of 172.16.2.160 and a shored mask of 255.255.255.192 to which shored does the host belong? A. 172.16.2.32 B. 172.16.2.64 C. 172.16.2.96 D. 172.16.2.128 E. 172.16.2.192
Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10.1.1.1 B.) 10.1.1.66 C.) 10.1.1.130 D.) 10.1.1.127
If you are running Token Ring with Novell IPX routing, which encapsulation should you use? A.) SAP B.) SNAP C.) 802.5 D.) 802.2
What command displays a summary list of OSPF interfaces that includes a column for the cost of each interface?
What is the simplest way to remotely configure a router?
Name the command we give on privilege mode for coming back to user execution mode?
Can you give an overview of various components in IPSec?
Routers can learn about destinations through static routes, default, or dynamic routing. By default, a router will use information derived from __________. A. IGRP B. RIP C. IP D. TCP
What is the second best path name of eigrp?
How is rip different from igrp?
Based on the DR AND BDR discussion i want to put one question the question is what is the name of protocol which is responsible;e for DR and BDR selection
What is a protocol