What do the following statements in an extended access list
accomplish?
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0
0.0.0.255 eq 21
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0
0.0.0.255 eq 20
access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0
255.255.255.255
A. This will block ftp traffic.
B. This will block http traffic.
C. This will permit ftp traffic.
D. This will permit tftp traffic.
Answer / guest
Answer:: A
This will block ftp traffic since ftp uses ports 20 and 21.
| Is This Answer Correct ? | 4 Yes | 0 No |
What is icmp protocol?
What is the maximum number of subnets that can be assigned to networks when using the address 172.16.0.0 with a subnet mask of 255.255.240.0? (Assume older version UNIX workstations are in use.) A. 16 B. 32 C. 30 D. 14 E. It is an invalid subnet mask for the Network.
hi friends i have some problem regarding technical round ahr round plz tell me what should the right answer technical questions 1 what is brouter 2 what is the menaing of 10 base2, 10 base 5 and 10baset 3 what is diffrence between bit rate and baud rate. and this question was tooooooooooo much difficult to me that hr said to me that rank me after the taking the all short of interview
How do you go to privileged mode? How do you switch back to user mode?
Which two describe frame tagging? A.) Examines particular info about each frame B.) A unique ID placed in the header of each frame as it traverses the switch fabric C.) A user- assigned ID defined to each frame D.) The building of filter tables
Identify the 2 commands that save the running-config to a TFTP server? A.) write running tftp B.) copy running network C.) copy running tftp D.) write network
what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs?
CPE is an acronym for which of the following? A.) Customer Premise Equipment B.) Central Processing Engineering C.) Customer Process Equipment D.) Central Processing Equipment
Can you explain in a generic manner the packet of IPSec?
what is ACLs? what is the reasons to create ACLs?
In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this? A.) Defining a Maximum. B.) You can not solve the 'count to infinity' problem with a distance vector protocol. C.) Poison Reverse. D.) Triggered Updates. E.) Split Horizon.
What is an advantage of local area network (LAN) segmentation? A. smaller collision domains B. elimination of broadcasts C. decreased cost of implementation D. larger number of users within the same domain