Identify the access-list range for an extended IP access-list?

A.) 800 - 899

B.) 1 - 99

C.) 1000 - 1099

D.) 100 - 199

Answers were Sorted based on User's Feedback



Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.)..

Answer / guest

Answer: D

IP extended access-lists use the number range of 100-199.

Is This Answer Correct ?    5 Yes 0 No

Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.)..

Answer / naresh

Identify the access-list range for an extended IP access-
list?

A.) 800 - 899

B.) 1 - 99

C.) 1000 - 1099

D.) 100 - 199

Answer= D.) 100 - 199

Is This Answer Correct ?    3 Yes 2 No

Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.)..

Answer / b.ramesh

ANS D) 100-199

Is This Answer Correct ?    1 Yes 0 No

Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.)..

Answer / gurunath

C.)1000-1099

Is This Answer Correct ?    0 Yes 3 No

Post New Answer

More CCNA Interview Questions

CSMA/CD stand for which of the following? A.) Carrier Sense, Multiple Access with Collision Detection B.) Collision Sense, Multiple Access with Collision Detection C.) Collision Sense, Multiple Access with Carrier Detection D.) Carrier Sense, MAC address with Collision Detection

3 Answers  


Which OSI layer provides mechanical, electrical, procedural for activating, maintaining physical link? A.) Presentation B.) Network C.) Application D.) Physical E.) Transport F.) Data-Link

2 Answers  


How we put NIC in promiscuous mode when using MS windows, can any one tell me in detail

1 Answers   Cisco, IBM,


Identify the command mode necessary to enter the standard ping command? A.) Router(config)# B.) Router> C.) Router(std-ping)# D.) Router(config-if)#

2 Answers  


what is a routing ?what is the use of routing?

8 Answers   Google, IBM, Pacific, Tata Technologies,






Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's

2 Answers  


What is the default encapsulation of Netware 3.12? A.) Ethernet_II B.) 802.5 C.) 802.2 D.) 802.3

1 Answers  


How does cut-through LAN switching work?

0 Answers  


Which protocol works at the Internet layer and is responsible for making routing decisions? A.) UDP B.) IP C.) TCP D.) ARP

3 Answers  


What is convergence time? A.) The update time B.) The time it takes to reload a router C.) The time it takes for a packet to reach its destination D.) The time is takes for all routers update their tables after a change takes place

2 Answers  


Which of these is the Private key? A. Bear B. Cave C. Indian D. Cowboy

1 Answers  


How many hop counts are by default and how much you can increase in eigrp protocol?

0 Answers  


Categories