Which of the following is a valid extended IP access-list?
A.) router(config)# access-list 101 permit tcp host
172.16.30.0 any eq
21 log
B.) router# access-list 101 permit tcp host 172.16.30.0 any
eq 21 log
C.) router(config)# acess-list 101 permit any any 172.16.30.0
D.) router(config)# access-list 101 permit ip host
172.16.30.0 any eq 21
log
Answers were Sorted based on User's Feedback
Answer / sudeep
All options are wrong
in A) router(config)# access-list 101 permit tcp host
172.16.30.2 any eq 80 <port no>
Now option A is correct
Is This Answer Correct ? | 2 Yes | 0 No |
Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connections D.) Path selection E.) MAC address examination F.) Network monitoring
What are the conversion steps of data encapsulation?
What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.
CSMA/CD stand for which of the following? A.) Carrier Sense, Multiple Access with Collision Detection B.) Collision Sense, Multiple Access with Collision Detection C.) Collision Sense, Multiple Access with Carrier Detection D.) Carrier Sense, MAC address with Collision Detection
Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II
Novell IPX network addresses have two conferrable parts. The network administrator specifies the IPX network number. How is the node number determined? A. It is the serial number of the given device B. It is assigned as a lease by Novell DHCP C. It is also set by the network administrator D. It is usually the MAC address of one Interface E. It is downloaded by Netware Core Protocol (NCP)
Which device works at the Network Layer of the OSI model? Router Switch Bridge Hub
Which technologies listed below help prevent network loops in a switched (bridged) environment? A.) Store-and-Forward B.) IEEE 802.1d C.) Diikjstra Algorithm D.) Cut-Through E.) Spanning Tree Protocol F.) Routing
Which command displays the IPX SAP table? A.) show ipx sap B.) show sap C.) show ipx interface D.) show ipx servers E.) show ipx
Of the following, which reason applies to dividing a large network into two or more smaller networks? Performance Security Address Management All of the above
What is subnetting? Why is it used?
Urgent reply plz donot have time to serch on google plz reply the questions is how to remove newfolder.exe virus from my windows 2003 server i have all ready tried quick heal.spy hunter mcafee server . plz reply