Which of the following are logged when IP access list logging is

enabled?

A.) source address

B.) protocol

C.) source port

D.) destination address

E.) access list number

F.) destination port



Which of the following are logged when IP access list logging is enabled? A.) source address ..

Answer / guest

Answer: A B C D F

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More CCNA Interview Questions

Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed

1 Answers  


Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10.1.1.1 B.) 10.1.1.66 C.) 10.1.1.130 D.) 10.1.1.127

2 Answers  


What is the purpose of ARP? A.) IP to host name resolution B.) Host name to IP address resolution C.) Mac to IP address resolution D.) IP to Mac address resolution

2 Answers  


Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it

1 Answers  


When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.

1 Answers  






Identify the command that forces the router to load into ROM mode upon a reload? A.) boot system rom B.) rom boot C.) boot system flash rom D.) boot router rom

1 Answers  


Which of the following are Presentation Layer standards? A.) JPEG and PICT B.) MPEG and MIDI C.) ASCII and EBCDIC D.) NFS and SQL

2 Answers  


hi friend i am stuck in the big problem.this problem is regading pix firewall. i have a cisco pix 515e firewall inmy company.now when i configure it and after rebooting it the ACT link never getup.when i apply clear config all comand the ACT link get up after oveservation i see that there is fauilover problem when i apply failover active ACT link agin get up is there any way to get my firewall in standby mode rember that there is only on firewall within my n/w i am lookig towards all of you jitendera kumar sinha

0 Answers  


Explain the difference between routing and routed protocols?

0 Answers  


Which command enables directly connected network 199.55.72.0 to be used by RIP? A. Router(config router)# rip 199.55.0.0 B. Router(config router)# rip 199.55.72.0 C. Router(config router)# network 199.55.0.0 D. Router(config router)# network 199.55.72.0

1 Answers  


What is the size of IP address?

0 Answers  


Which of the following is used to manage and monitor the network? A.) SNMP B.) HTTP C.) IP D.) FTP

4 Answers  


Categories