Which Standard IP Access list commands will deny only the source
address 1.1.1.1?
A.) access-list 9 deny host 1.1.1.1
B.) access-list 9 deny 1.1.1.1 255.255.255.0
C.) access-list 9 deny 1.1.1.1 0.0.0.0
D.) access-list 9 deny 1.1.1.1 0.255.255.255
E.) access-list 9 deny 1.1.1.1 255.255.255.255
Answers were Sorted based on User's Feedback
Answer / prasanna
D
is the ryt answer
when we applying acl the host address must be reversed
| Is This Answer Correct ? | 0 Yes | 0 No |
Cisco routers use wildcard masking to identify how to check or ignore corresponding IP address bits. What does setting a wildcard mask bit to 0 cause the router to do? A. It tells the router to check the corresponding bit value. B. It tells the router to ignore the corresponding bit value. C. It tells the router to check its alternate routing list. D. It tells the router to use its primary routing list.
Significance of IP helper-address Command on SW? Is it necessary to put this command?
What is the default bandwidth of a serial connection? A.) 1200 baud B.) 1.544 Mbps (T1) C.) 10 Mbps D.) 96Kpbs
Name the command we give for see routing table?
When configuring the subnet mask for an IP address, which formats can be used?A. dotted-decimal. B. Hexadecimal C. Bit-count D. Octal E. Binary
What is the result of segmenting a network with a router into segments 1 and 2? A. It increases the number of collisions B. It decreases the number of broadcast domains C. It connects segment 1 and broadcasts to segment 2 D. It connects segment 1 and broadcasts from genre to segment 2
Which two commands show your access lists? (Choose two) A. show filters B. show access-lists C. show ip access-lists D. show running-config
When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.
Tell me which protocol called rapid protocol?
Suppose a Switch interface went in error-dis mode what you will do for Troubleshooting List all Possibilities
How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain
Identify the 2 rules used when configuring a Distance Vector routing protocol? A.) Physically connected network(s) B.) Configure the classful address, no subnets C.) Enable CDP so neighbors can be detected D.) Configure all networks in Area0