What should be the first command to create an access-list that
prevents all users on subnetwork 10.10.128.0, using subnet mask
255.255.192.0, from being
able to telnet anywhere?
A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq
telnet
B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq
telnet
C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq
telnet
E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq
telnet
F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq
telnet
Answers were Sorted based on User's Feedback
Answer / tahir haider
access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
C:
Is This Answer Correct ? | 5 Yes | 1 No |
what is vc,pvc,lmi and dlsi
What is 10base5 ethernet lans?
Explain the difference between routing and routed protocols?
As the system administrator, you enter the following commands at the command prompt: ipx routing access-list 800 permit 2b 4d int e0 ipx network 4d ipx access-group 800 out int e1 ipx network 2b int e2 ipx network 3c What did these command accomplish? A. Traffic from network 4c destined for network 4d will be forwarded out Ethernet0. B. Traffic from network 3c destined for network 4d will be forwarded out Ethernet0. C. Traffic from network 2b destined for network 4d will be forwarded out Ethernet0. D. Traffic from network 4d destined for network 2d will be forwarded out Ethernet0.
Which of the following provide correct information about a protocol at the transport layer of the OSI model? A.) UDP - Provides Connectionless datagrams service B.) TCP - Provides Connection Oriented Services C.) SMTP - Provides Mail Exchange D.) IP - Route determination E.) TCP - Provides Flow Control and Error Checking F.) FTP - Transfers of Files
Identify the 2 commands that copies the configuration in NVRAM to RAM? A.) copy backup-config running-config B.) configure nvram C.) copy startup-config running-config D.) configure memory
Hi all, Kindly can you tell me what is demand ccna voice in field and what is profile of ccna voice.so pl very urgent bcz i am going to join institute
Which of the following do not belong to the customer? A.) CO B.) DCE C.) Router D.) CPE E.) Demarc F.) DTE
Which of the following is a valid TCP/IP socket for an Email connection? 101.34.2.125:25 00-00-03-1B-CA-6F:143 202.167.23.101:21 60.4:110
Identify the order of the 5 step encapsulation? 1. Create the segment 2. Convert the frame to bits 3. Create the packet 4. Create the frame 5. User creates the data A.) 1,2,4,2,5 B.) 2,1,3,4,5 C.) 5,1,3,4,2 D.) 5,3,4,1,2
Identify the protocol to test connectivity without configuring any layer 3 protocols? A.) TCP B.) Ping C.) IP D.) CDP E.) Telnet
Which IP packet field will prevent endless loops? type-of-service identificationf lags time-to-live header checksum