What does the parameter -- LOG -- do on an IPX access list?
A.) The log keyword is not a valid option.
B.) Read the LOG to figure out what traffic to deny.
C.) Logs the creation of the access list.
D.) Logs IPX access control list violations whenever a
packet matches a
particular access list entry.
E.) Ensures the IPX protocol places a log in the fireplace.
Answer / guest
Answer: D
Router(config)#access-list 900 deny any ?
log Log matches against this entry
| Is This Answer Correct ? | 0 Yes | 0 No |
what are the different asymmetric algorithms?
Why subnetting is used?
Which Standard IP Access list commands will deny only the source address 1.1.1.1? A.) access-list 9 deny host 1.1.1.1 B.) access-list 9 deny 1.1.1.1 255.255.255.0 C.) access-list 9 deny 1.1.1.1 0.0.0.0 D.) access-list 9 deny 1.1.1.1 0.255.255.255 E.) access-list 9 deny 1.1.1.1 255.255.255.255
What is public and private ip address., explain? and also explain the ip address range of both public and private? and where we use that public and private ip address?
What type of switching creates variable latency through the switch? A.) Cut-Through B.) Inverted C.) Layer 4 D.) Multiplexed E.) Store and Forward
Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session
Identify the command that displays traffic statistics on serial0/1? A.) display interface serial0/1 B.) show interface serial0/1 C.) show seria0/1 stats D.) show interface serial0/1 stats
Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of (pick the best answer only): A.) Poison Reverse B.) Connectionless protocol C.) Windowing D.) Connection oriented protocol E.) Flow Control F.) Split Horizon
Which of the following provide connection-oriented transport to upper layer protocols? A.) SPX B.) RIP C.) NLSP D.) NCP
What is the difference between rip and igrp?
When does network congestion occurs?
What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable