What does the parameter -- LOG -- do on an IPX access list?
A.) The log keyword is not a valid option.
B.) Read the LOG to figure out what traffic to deny.
C.) Logs the creation of the access list.
D.) Logs IPX access control list violations whenever a
packet matches a
particular access list entry.
E.) Ensures the IPX protocol places a log in the fireplace.
Answer / guest
Answer: D
Router(config)#access-list 900 deny any ?
log Log matches against this entry
Is This Answer Correct ? | 0 Yes | 0 No |
Which of the following is a valid extended IP access-list? A.) router(config)# access-list 101 permit tcp host 172.16.30.0 any eq 21 log B.) router# access-list 101 permit tcp host 172.16.30.0 any eq 21 log C.) router(config)# acess-list 101 permit any any 172.16.30.0 D.) router(config)# access-list 101 permit ip host 172.16.30.0 any eq 21 log
Hi all, suppose more than two network administrators are configure same router with different configuration through telnet at the same time.. then whose(admin's) configuration will use router for routing ?
What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops
There are 2 types of PPP authentication supported by the Cisco IOS. What are they? A.) PAP B.) PREDICTOR C.) MD5 D.) CHAP E.) STACKER F.) MSCHAP
What is a benefit of a virtual LAN (VLAN)? A. It increases the number of broadcast domains B. It decreases the number of broadcast domains C. It increases the numberr of collision domains D. It decreases the number of collision domains E. Since it is a vitual Interface it never shuts down
What is the regional Telco office called, where the customers local loop terminates? A.) Demarc B.) DTE C.) DCE D.) CO E.) CPE
The maximum distance on a 10BaseT network from the hub to a workstation is which of the following? A.) 500 meters B.) 1000 meters C.) 100 meters D.) 1500 meters
Tell me why we use filter option?
The "ipx delay number" command will allow an administrator to change the default settings. What are the default settings? A. For LAN interfaces, one tick; for WAN interfaces, six ticks B. For LAN interfaces, six ticks; for WAN interfaces, one tick C. For LAN interfaces, zero ticks; for WAN interfaces, five ticks D. For LAN interfaces, five ticks; for WAN interfaces, zero Ticks
What are the three phases of PPP session establishment? A. Link establishment phase B. Authentication phase C. Network layer protocol phase D. Handshake phase E. Dial-in phase
Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it
What are the conversion steps of data encapsulation?