Identify the 2 types of access-list filters that control SAP
traffic?

A.) Novell-ether

B.) Arpa

C.) Input-sap-filter

D.) Round-robin

E.) Output-sap-filter



Identify the 2 types of access-list filters that control SAP traffic? A.) Novell-ether B.) Ar..

Answer / guest

Answer: C E

SAP's can be blocked by 2 methods; inbound and outbound.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Define the different kinds of casting

0 Answers  


Which of the following are Presentation Layer standards? A.) JPEG and PICT B.) MPEG and MIDI C.) ASCII and EBCDIC D.) NFS and SQL

2 Answers  


what is routing and routed protocol ?

7 Answers  


Which of the following are examples of the Transport Layer? A.) SQL B.) UDP C.) IP D.) LLC E.) ARP

1 Answers  


What is the bit length and expression form of a MAC address? A. 24 bits expressed as a decimal number B. 24 bits expressed as a hexadecimal number C. 36 bits expressed as a binary number D. 48 bits expressed as a decimal number E. 48 bits expressed as a hexadecimal number

2 Answers  






In eigrp metric parameters which 2 options are enable by default?

0 Answers  


Can Anybody tell me if I wanna block all MP3,video sites from cisco 2600 router,how shall i proceed with ACL's?? Please post the steps for the following alonge with detail. Thanks to you all ..appriciated

5 Answers   Cisco,


what is uplink port why are we use this port,this port having extra feature or only use to redundant link or other please explain it ,,,,,,,,,,,,,,,, bcz i am very confuse ..... Thanks

3 Answers  


Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged the are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination

1 Answers  


Mention the ranges for the private IP?

0 Answers  


Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  


Which command displays access list 111? A. show access-list 111 B. show ip access-list 111 C. display ip access-list 111 D. display access-list 111 details

6 Answers   Satyam,


Categories