What should be the first command to create an access-list that
prevents all users on subnetwork 10.10.128.0, using subnet mask
255.255.192.0, from being
able to telnet anywhere?
A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq
telnet
B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq
telnet
C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq
telnet
E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq
telnet
F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq
telnet
Answers were Sorted based on User's Feedback
Answer / tahir haider
access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
C:
| Is This Answer Correct ? | 5 Yes | 1 No |
Which statement about the data link connection identifier (DLCI) is true? A. It is a number that identifies a local virtual circuit in a Frame Relay network B. It is a signaling standard between the CIDE device and the Frame Relay switch C. It is the clock speed (pod speed) of the connection (local loop) to the Frame Relay Cloud D. It is the Maximum number of uncommitted bits that the Frame Relay switch will attempt to transfer beyond the Committed Information Rate (CIP)
Name which protocols are link states?
Describe End to End network services: (Choose all that apply) A.) Best Route selection B.) Accomplished Segment by Segment, each segment is autonomous C.) Flow Control & Data Integrity D.) Best efforts packet delivery
The benefits to segmenting with Bridges are which of the following? A.) Scalability B.) Datagram filtering C.) Manageability D.) Reliability
What is a benefit of a virtual LAN (VLAN)? A. It increases the number of broadcast domains B. It decreases the number of broadcast domains C. It increases the numberr of collision domains D. It decreases the number of collision domains E. Since it is a vitual Interface it never shuts down
What is the size of an ip address?
If configuring a Cisco router to connect to a non-Cisco router across a Frame Relay network, which encapsulation type would you select? A.) Q933a B.) ISDN C.) IETF D.) CISCO E.) ANSI
what is ACLs? what is the reasons to create ACLs?
what is stp.
What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.
what is the diffination of bandwidth.
LMI operates between the Frame Switch and what other device? A.) CPE device B.) Another Frame Switch C.) X.25 switch D.) Novell File Server