Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What do the following statements in an extended access list

accomplish?

access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0
0.0.0.255 eq 21

access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0
0.0.0.255 eq 20

access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0
255.255.255.255

A. This will block ftp traffic.

B. This will block http traffic.

C. This will permit ftp traffic.

D. This will permit tftp traffic.



What do the following statements in an extended access list accomplish? access-list 101 deny T..

Answer / guest

Answer:: A

This will block ftp traffic since ftp uses ports 20 and 21.

Is This Answer Correct ?    4 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is icmp protocol?

0 Answers  


What is the maximum number of subnets that can be assigned to networks when using the address 172.16.0.0 with a subnet mask of 255.255.240.0? (Assume older version UNIX workstations are in use.) A. 16 B. 32 C. 30 D. 14 E. It is an invalid subnet mask for the Network.

2 Answers  


hi friends i have some problem regarding technical round ahr round plz tell me what should the right answer technical questions 1 what is brouter 2 what is the menaing of 10 base2, 10 base 5 and 10baset 3 what is diffrence between bit rate and baud rate. and this question was tooooooooooo much difficult to me that hr said to me that rank me after the taking the all short of interview

5 Answers  


How do you go to privileged mode? How do you switch back to user mode?

0 Answers  


Which two describe frame tagging? A.) Examines particular info about each frame B.) A unique ID placed in the header of each frame as it traverses the switch fabric C.) A user- assigned ID defined to each frame D.) The building of filter tables

2 Answers  


Identify the 2 commands that save the running-config to a TFTP server? A.) write running tftp B.) copy running network C.) copy running tftp D.) write network

1 Answers  


what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs?

1 Answers  


CPE is an acronym for which of the following? A.) Customer Premise Equipment B.) Central Processing Engineering C.) Customer Process Equipment D.) Central Processing Equipment

2 Answers   Cisco,


Can you explain in a generic manner the packet of IPSec?

0 Answers   CCIE,


what is ACLs? what is the reasons to create ACLs?

1 Answers  


In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this? A.) Defining a Maximum. B.) You can not solve the 'count to infinity' problem with a distance vector protocol. C.) Poison Reverse. D.) Triggered Updates. E.) Split Horizon.

2 Answers  


What is an advantage of local area network (LAN) segmentation? A. smaller collision domains B. elimination of broadcasts C. decreased cost of implementation D. larger number of users within the same domain

1 Answers  


Categories