Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which of the following is a valid extended IP access-list?

A.) router(config)# access-list 101 permit tcp host
172.16.30.0 any eq

21 log

B.) router# access-list 101 permit tcp host 172.16.30.0 any
eq 21 log

C.) router(config)# access-list 101 permit any any 172.16.30.0

D.) router(config)# access-list 101 permit ip host
172.16.30.0 any eq 21

log

Answers were Sorted based on User's Feedback



Which of the following is a valid extended IP access-list? A.) router(config)# access-list 101 pe..

Answer / deepak ruhela

Which of the following is a valid extended IP access-list?
A.) router(config)# access-list 101 permit tcp host
172.16.30.0 any eq 21 log B.) router# access-list 101
permit tcp host 172.16.30.0 any eq 21 log C.) router(config)
# access-list 101 permit any any 172.16.30.0 D.) router
(config)# access-list 101 permit ip host 172.16.30.0 any eq
21 log

Answer: B

Is This Answer Correct ?    7 Yes 1 No

Which of the following is a valid extended IP access-list? A.) router(config)# access-list 101 pe..

Answer / guest

Answer: A

Is This Answer Correct ?    2 Yes 3 No

Post New Answer

More CCNA Interview Questions

What type of switching creates variable latency through the switch? A.) Cut-Through B.) Inverted C.) Layer 4 D.) Multiplexed E.) Store and Forward

1 Answers  


What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer

1 Answers  


An autonomous system can only exist if all routers in that system meet which criteria? A. interconnected B. run the same routing protocol C. assigned same autonomous system number D. run IGRP only E. run RIP only

1 Answers  


What is the difference between dynamic NAT and NAT overloading

4 Answers  


Which command would show all Ethernet interfaces with IPX configured on them? A.) show interface ipx ethernet B.) show ipx interface C.) show ipx interface ethernet D.) show ipx E.) show version F.) show run

1 Answers  


What are partial updates?

0 Answers  


Cisco routers use wildcard masking to identify how to check or ignore corresponding IP address bits. What does setting a wildcard mask bit to 0 cause the router to do? A. It tells the router to check the corresponding bit value. B. It tells the router to ignore the corresponding bit value. C. It tells the router to check its alternate routing list. D. It tells the router to use its primary routing list.

2 Answers  


Identify the statement which connects access-list 101 inbound to interface e0? A.) Router(config-if)# ip access-group 101 in B.) Router(config-if)# ip access-group 101 C.) Router(config)# ip access-group 101 e0 in D.) Router(config)# ip access-group 101 e0 in

1 Answers  


Using the TCP/IP protocol suite, a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of a MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses PARP requests D. It uses a router lookup table

1 Answers  


What is window in networking terms?

0 Answers  


Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2

3 Answers  


Explain what is formula of hold down time of eigrp protocol?

0 Answers  


Categories