Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What does the parameter -- LOG -- do on an IPX access list?

A.) The log keyword is not a valid option.

B.) Read the LOG to figure out what traffic to deny.

C.) Logs the creation of the access list.

D.) Logs IPX access control list violations whenever a
packet matches a

particular access list entry.

E.) Ensures the IPX protocol places a log in the fireplace.



What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid op..

Answer / guest

Answer: D

Router(config)#access-list 900 deny any ?

log Log matches against this entry

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is the correct command line syntax for configuring a port on a 7000 or 7500 series Cisco router with a VIP card? A.) port B.) port adapter/port C.) You can't put a VIP card in a 7000 or 7500 router. D.) slot/port-adapter/port E.) slot/port F.) slot

1 Answers  


Whith the hierarchical numbering of IP addressing what determines the spoon of the address that will identify the network number? A. subnet mask B. dots between octets C. class of the first octet D. assignments of DHCP E. address resolution process

1 Answers  


Identify command that configures 'Cisco1' as a secret password? A.) Router(config)# enable secret password Cisco1 B.) Router(config)# enable secret cisco1 C.) Router(config)# enable password Cisco1 D.) Router(config)# enable secret Cisco1

2 Answers  


What is the size of hello packets in eigrep protocol?

0 Answers  


Value in which type of access list?

0 Answers  


Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10.1.1.1 B.) 10.1.1.66 C.) 10.1.1.130 D.) 10.1.1.127

2 Answers  


Hi, Shahin Thanks a lot for providing me these sites. These links are really helpful for me. r u working somewhere please let me know

1 Answers  


Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub

1 Answers  


Identify the command mode necessary to enter the extended ping command? A.) Router# B.) Router> C.) Router(config)# D.) Router(ext-ping)#

1 Answers  


We know that TCP provides connection oriented services, what else does it provide? A.) FECN & BECN B.) Path discovery. C.) Flow control and error checking. D.) Name resolution. E.) File manipulation.

1 Answers  


Which of the following are examples of the Datalink Layer? A.) LLC B.) SQL C.) TCP D.) Token Ring E.) IP

2 Answers  


Which two solutions are used to reduce the chance of distance vector routing loops? (choose two) A. split horizon B. route poison C. area hierarchies D. link state algorithms

1 Answers  


Categories