Identify 3 feature of access-lists?

A.) Implicit deny will deny any packets not matched

B.) Processed sequentially from bottom to top

C.) Processed sequentially from top to bottom

D.) If a packet is denied it would be tested against the
remaining

statements in the access-list

E.) Once a match is made the packet is either denied or
permitted

F.) Enabled on all interfaces by default



Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Pr..

Answer / guest

Answer: A C E

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

Explain the term 'multicast'.

0 Answers  


What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.

2 Answers   Wipro,


Suppose we are having two router i.e. Router1 and Router 2 connected with each other on Serial Link,Router Network having ip 192.168.1.0/24. 1> which ip is used at router1 and router2 interface? 2>Which Command is used to assign ip to router1 and router2 interface?

1 Answers  


Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session

2 Answers  


Which command switches from User mode to Privileged mode? A.) login B.) privilege C.) admin D.) enable E.) enter F.) root

5 Answers  


Which can be true regarding VLANs? A.) They are created by location B.) They are created by function C.) They are created by department D.) They are created by group

1 Answers  


There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address? A. RARP B. ARP C. RIP D. IGRP

3 Answers  


What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS

1 Answers  


Which layer manages protocol access to the Network layer? A.) Datalink - MAC Sublayer B.) Datalink - LLC Sublayer C.) Transport D.) Session E.) Network

3 Answers  


A routing table contains static, RIP, and EIGRP routes for the same destination network. Which route would normally be used to forward data?

15 Answers   TCS, Wipro,


What is the difference between TCP and UDP? A.) TCP is connection-oriented; UDP uses acknowledgements only B.) TCP is connection-oriented; UDP is connectionless C.) Both TCP and UDP are connection-oriented, but only TCP uses windowing D.) TCP and UDP both have sequencing, but UDP is connectionless

4 Answers  


Which of the following is an example of a Transport Layer protocol? Ethernet IP TCP RS-232

2 Answers  


Categories