Which Standard IP Access list commands will deny only the source
address 1.1.1.1?
A.) access-list 9 deny host 1.1.1.1
B.) access-list 9 deny 1.1.1.1 255.255.255.0
C.) access-list 9 deny 1.1.1.1 0.0.0.0
D.) access-list 9 deny 1.1.1.1 0.255.255.255
E.) access-list 9 deny 1.1.1.1 255.255.255.255
Answers were Sorted based on User's Feedback
Answer / prasanna
D
is the ryt answer
when we applying acl the host address must be reversed
| Is This Answer Correct ? | 0 Yes | 0 No |
Where shall i do CCNA cour??. can i do CCNA at home if yes then where shall i get CCNA book or simmulator.or if not then plz reff. me any good center in delhi
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
The -- terminal no editing -- command will perform what function? A.) Edit the contents of NVRAM B.) Allows access to the terminal port C.) Stops the advanced editing feature D.) Enable password functions
Identify the following command to configure a secret password to 'cisco'? A.) Router(config)#enable password cisco secret B.) Router(config)#enable secret cisco C.) Router(config)#enable secret password cisco D.) Router(config)#set secret = cisco
Which of the follow do not belong to the customer? A.) CO B.) DCE C.) Router D.) CPE E.) Demarc F.) DTE
which is following route will be used to froword data in a situation where a routing table tables contains static ,RIP,IGRP routes destined to the same network with each set to its default administrative distance
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
Which command we use for ping in ipv6?
What are the things that can be accessed in a CISCO router’s identifying information?
What utility can you use to see the path a packet takes through an internetwork? A.) Route B.) SNMP C.) Trace D.) Ping
what is the basic rules for ACLs?