When using access lists, it is important where those access
lists
are placed. Which statement best describes access list
placement?
A. Put standard access lists as near the destination as
possible. Put
extended access lists as close to the source as possible.
B. Put extended access lists as near the destination as
possible. Put
standard access lists as close to the source as possible.
C. It isn't import where access lists are placed since the
router will
read and cache the whole list.
D. Put access lists as close to corporate headquarters as
possible.
Answer / guest
Answer: A
Put standard access lists as near the destination as
possible. Put
extended access lists as close to the source as possible.
Standard
access lists don't specify the destination address.
| Is This Answer Correct ? | 2 Yes | 0 No |
You need to come up with a TCP/IP addressing scheme for your company. How many network IDs must you allow for when you define the subnet mask for the network? A.) One for each WAN link B.) One for each router interface C.) One for each NIC installed in each client D.) One for each subnet with hosts E.) One for each host ID
What is the distance limitation for 100BaseT? A. 607 ft B. 25 Meters C. 1,000 ft D. 185 Meters
What is the function of a router?
heyyy frnds can please me that which institue is good for me in hardware and networking because im coming frm Dubai
How do you find valid hosts in a subnet?
What is half duplex and full duplex?
Why ESP Transport mode is not compatible with NAT????? Though New IP Header in Tunnel mode & Original IP Header in Transport mode are out of Authentication & Encryption.
Which two protocol tools use ICMP? (Choose two) A. ping B. telnet C. configure D. traceroute E. show commands F. standard access lists
Why do we have a Layered Model? 1) It reduces complexity 2) Allows for a standardized interface 3) Facilitates modular engineering 4) Ensures interoperable technology 5) Accelerates evolution 6) Simplifies teaching and learning
The Integrated Services Digital Network (ISDN) Basic Rate Interface (BRI) provides which of the following? A.) 1.544 Mbps B.) 23B + 1D Channel C.) 24B + 1D Channel D.) 2B + 1D Channel E.) 23B + the Disney Channel
Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.
How does inter- VLAN communication take place? A. It takes place through any Cisco router B. It takes place through a Cisco router that can run ISL C. It takes place through a router but this disables all the router a security and filtering functionality for the VLANS D. For nonroutable protocals (e.g. NetBeui) the router provides communications between VLAN domains E. Inter-VLAN communication is not possible because each VLAN is a separate broadcast domain