What does the parameter -- LOG -- do on an IPX access list?
A.) The log keyword is not a valid option.
B.) Read the LOG to figure out what traffic to deny.
C.) Logs the creation of the access list.
D.) Logs IPX access control list violations whenever a
packet matches a
particular access list entry.
E.) Ensures the IPX protocol places a log in the fireplace.
Answer / guest
Answer: D
Router(config)#access-list 900 deny any ?
log Log matches against this entry
| Is This Answer Correct ? | 0 Yes | 0 No |
What is the correct command line syntax for configuring a port on a 7000 or 7500 series Cisco router with a VIP card? A.) port B.) port adapter/port C.) You can't put a VIP card in a 7000 or 7500 router. D.) slot/port-adapter/port E.) slot/port F.) slot
Whith the hierarchical numbering of IP addressing what determines the spoon of the address that will identify the network number? A. subnet mask B. dots between octets C. class of the first octet D. assignments of DHCP E. address resolution process
Identify command that configures 'Cisco1' as a secret password? A.) Router(config)# enable secret password Cisco1 B.) Router(config)# enable secret cisco1 C.) Router(config)# enable password Cisco1 D.) Router(config)# enable secret Cisco1
What is the size of hello packets in eigrep protocol?
Value in which type of access list?
Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10.1.1.1 B.) 10.1.1.66 C.) 10.1.1.130 D.) 10.1.1.127
Hi, Shahin Thanks a lot for providing me these sites. These links are really helpful for me. r u working somewhere please let me know
Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub
Identify the command mode necessary to enter the extended ping command? A.) Router# B.) Router> C.) Router(config)# D.) Router(ext-ping)#
We know that TCP provides connection oriented services, what else does it provide? A.) FECN & BECN B.) Path discovery. C.) Flow control and error checking. D.) Name resolution. E.) File manipulation.
Which of the following are examples of the Datalink Layer? A.) LLC B.) SQL C.) TCP D.) Token Ring E.) IP
Which two solutions are used to reduce the chance of distance vector routing loops? (choose two) A. split horizon B. route poison C. area hierarchies D. link state algorithms