Which Standard IP Access list commands will deny only the source

address 1.1.1.1?

A.) access-list 9 deny host 1.1.1.1

B.) access-list 9 deny 1.1.1.1 255.255.255.0

C.) access-list 9 deny 1.1.1.1 0.0.0.0

D.) access-list 9 deny 1.1.1.1 0.255.255.255

E.) access-list 9 deny 1.1.1.1 255.255.255.255

Answers were Sorted based on User's Feedback



Which Standard IP Access list commands will deny only the source address 1.1.1.1? A.) access-l..

Answer / guest

Answer: A C

Is This Answer Correct ?    5 Yes 3 No

Which Standard IP Access list commands will deny only the source address 1.1.1.1? A.) access-l..

Answer / nilesh d

D

Is This Answer Correct ?    2 Yes 0 No

Which Standard IP Access list commands will deny only the source address 1.1.1.1? A.) access-l..

Answer / prashant

access-list 9 deny 1.1.1.1 0.255.255.255

Is This Answer Correct ?    0 Yes 0 No

Which Standard IP Access list commands will deny only the source address 1.1.1.1? A.) access-l..

Answer / prasanna

D
is the ryt answer
when we applying acl the host address must be reversed

Is This Answer Correct ?    0 Yes 0 No

Which Standard IP Access list commands will deny only the source address 1.1.1.1? A.) access-l..

Answer / jaspreet singh

e

Is This Answer Correct ?    1 Yes 3 No

Post New Answer

More CCNA Interview Questions

What does the IPX maximum-path command do? A.) Allows you to disable the TTL on an IPX packet B.) This parameter is only used in NLSP routing C.) Sets the maximum metric that can appear in the routing table D.) Configures round robin load sharing over multiple equal metric paths (parallel paths)

1 Answers  


When we do default route?

0 Answers  


Eight stations connected to separate 10 Mobs pods on a Layer 2 switch will give each station how many Mobs of bandwidth? A. 1.25 B. 4 C. 16 D. 10 E. 80

1 Answers  


What key do you use to view the last command? A.) Ctrl+X B.) Ctrl+Z C.) Ctrl+E D.) Ctrl+P

2 Answers  


We know that TCP provides connection oriented services, what else does it provide? A.) FECN & BECN B.) Path discovery. C.) Flow control and error checking. D.) Name resolution. E.) File manipulation.

1 Answers  


You have a Class B network address divided into 30 subnets. You will add 25 new subnets within the next year. You need 600 host IDs for each subnet. Which subnet mask should you use? A.) 255.254.0.0 B.) 255.192.0.0 C.) 255.255.252.0 D.) 255.255.248 0

1 Answers  


In which ios version 182 people can access router through telenet?

0 Answers  


Of the following switching types, which one has the lowest latency? A.) Cut-through B.) Fragment Free C.) None D.) Store-and-forward

1 Answers  


1.hi all, my question is how maximum number of ports can exist in a switch? 2.Which type of switching good in using and why?

4 Answers   HCL,


Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ignoring the rest of the address B.) Determine the class of the IP address C.) Determine the network portion of an IP address D.) Hide the host portion of an IP address

1 Answers  


Which of the following are Transport layer protocols? A.) UDP B.) TCP C.) NBP D.) IP E.) SPX

3 Answers  


To monitor ipx traffic on a network, what command would you use? A. debug ipx transaction B. show ipx traffic C. show ipx events D. display ipx traffic

3 Answers  


Categories