Which of the following is a valid extended IP access-list?

A.) router(config)# access-list 101 permit tcp host
172.16.30.0 any eq

21 log

B.) router# access-list 101 permit tcp host 172.16.30.0 any
eq 21 log

C.) router(config)# acess-list 101 permit any any 172.16.30.0

D.) router(config)# access-list 101 permit ip host
172.16.30.0 any eq 21

log

Answers were Sorted based on User's Feedback



Which of the following is a valid extended IP access-list? A.) router(config)# access-list 101 pe..

Answer / guest

Answer: A

Is This Answer Correct ?    4 Yes 0 No

Which of the following is a valid extended IP access-list? A.) router(config)# access-list 101 pe..

Answer / sudeep

All options are wrong
in A) router(config)# access-list 101 permit tcp host
172.16.30.2 any eq 80 <port no>

Now option A is correct

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connections D.) Path selection E.) MAC address examination F.) Network monitoring

2 Answers  


What are the conversion steps of data encapsulation?

0 Answers  


What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.

2 Answers   Wipro,


CSMA/CD stand for which of the following? A.) Carrier Sense, Multiple Access with Collision Detection B.) Collision Sense, Multiple Access with Collision Detection C.) Collision Sense, Multiple Access with Carrier Detection D.) Carrier Sense, MAC address with Collision Detection

1 Answers  


Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II

2 Answers  






Novell IPX network addresses have two conferrable parts. The network administrator specifies the IPX network number. How is the node number determined? A. It is the serial number of the given device B. It is assigned as a lease by Novell DHCP C. It is also set by the network administrator D. It is usually the MAC address of one Interface E. It is downloaded by Netware Core Protocol (NCP)

1 Answers  


Which device works at the Network Layer of the OSI model? Router Switch Bridge Hub

5 Answers   CET, IBM,


Which technologies listed below help prevent network loops in a switched (bridged) environment? A.) Store-and-Forward B.) IEEE 802.1d C.) Diikjstra Algorithm D.) Cut-Through E.) Spanning Tree Protocol F.) Routing

1 Answers  


Which command displays the IPX SAP table? A.) show ipx sap B.) show sap C.) show ipx interface D.) show ipx servers E.) show ipx

1 Answers  


Of the following, which reason applies to dividing a large network into two or more smaller networks? Performance Security Address Management All of the above

2 Answers  


What is subnetting? Why is it used?

0 Answers  


Urgent reply plz donot have time to serch on google plz reply the questions is how to remove newfolder.exe virus from my windows 2003 server i have all ready tried quick heal.spy hunter mcafee server . plz reply

1 Answers  


Categories