What should be the first command to create an access-list that

prevents all users on subnetwork 10.10.128.0, using subnet mask

255.255.192.0, from being

able to telnet anywhere?

A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq
telnet

B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq
telnet

C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet

D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq
telnet

E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq
telnet

F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq
telnet

Answers were Sorted based on User's Feedback



What should be the first command to create an access-list that prevents all users on subnetwork 1..

Answer / tahir haider

access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
C:

Is This Answer Correct ?    5 Yes 1 No

What should be the first command to create an access-list that prevents all users on subnetwork 1..

Answer / shahin

Mr Tahir, Ur answer is wrong. As of no subnet mask is used
in ACL. It use WILD CARD MASK.

So correct answer wud be A.

access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq

Is This Answer Correct ?    1 Yes 1 No

What should be the first command to create an access-list that prevents all users on subnetwork 1..

Answer / guest

Answer: A

Is This Answer Correct ?    1 Yes 3 No

Post New Answer

More CCNA Interview Questions

what is vc,pvc,lmi and dlsi

1 Answers  


What is 10base5 ethernet lans?

0 Answers  


Explain the difference between routing and routed protocols?

0 Answers  


As the system administrator, you enter the following commands at the command prompt: ipx routing access-list 800 permit 2b 4d int e0 ipx network 4d ipx access-group 800 out int e1 ipx network 2b int e2 ipx network 3c What did these command accomplish? A. Traffic from network 4c destined for network 4d will be forwarded out Ethernet0. B. Traffic from network 3c destined for network 4d will be forwarded out Ethernet0. C. Traffic from network 2b destined for network 4d will be forwarded out Ethernet0. D. Traffic from network 4d destined for network 2d will be forwarded out Ethernet0.

1 Answers  


Which of the following provide correct information about a protocol at the transport layer of the OSI model? A.) UDP - Provides Connectionless datagrams service B.) TCP - Provides Connection Oriented Services C.) SMTP - Provides Mail Exchange D.) IP - Route determination E.) TCP - Provides Flow Control and Error Checking F.) FTP - Transfers of Files

2 Answers  






Identify the 2 commands that copies the configuration in NVRAM to RAM? A.) copy backup-config running-config B.) configure nvram C.) copy startup-config running-config D.) configure memory

3 Answers  


Hi all, Kindly can you tell me what is demand ccna voice in field and what is profile of ccna voice.so pl very urgent bcz i am going to join institute

3 Answers  


Which of the following do not belong to the customer? A.) CO B.) DCE C.) Router D.) CPE E.) Demarc F.) DTE

1 Answers  


Which of the following is a valid TCP/IP socket for an Email connection? 101.34.2.125:25 00-00-03-1B-CA-6F:143 202.167.23.101:21 60.4:110

2 Answers  


Identify the order of the 5 step encapsulation? 1. Create the segment 2. Convert the frame to bits 3. Create the packet 4. Create the frame 5. User creates the data A.) 1,2,4,2,5 B.) 2,1,3,4,5 C.) 5,1,3,4,2 D.) 5,3,4,1,2

1 Answers  


Identify the protocol to test connectivity without configuring any layer 3 protocols? A.) TCP B.) Ping C.) IP D.) CDP E.) Telnet

1 Answers  


Which IP packet field will prevent endless loops? type-of-service identificationf lags time-to-live header checksum

1 Answers  


Categories