Given the configuration example<HR>

<B>interface ethernet0

ipx network 4a

ipx access group 800 out

interface ethernet1

ipx network 3d

interface ethernet2

ipx network 5c

access list 800 permit 3d 4a</B><HR>

Which two actions result from implementing this
configuration? (Choose two)

A. IPX network 5c will not receive any traffic

B. Traffic from network 3d for network 4a will be forwarded
out e0

C. Traffic from network 4a for network 3d will be forwarded
out e0

D. Traffic from network 3d destined for network 4a will be
forwarded out e2

E. The access list is applied to an outgoing interface and
filters outbound traffic



Given the configuration example<HR> <B>interface ethernet0 ipx network 4a ipx a..

Answer / guest

Answer: D, E

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos

1 Answers  


Routers that have Flash memory typically have a ore loaded copy of place IOS software. Which command should you use to make a backup copy of the software image onto a given network server? A. copy flash tftp B. save copy to tftp C. write backup tftp D. write, backup -server-name- E. copy backup to -server-name-

1 Answers  


2. What are the valid ways to segment a LAN? (Choose all that apply) A. Repeater B. Bridge C. Switch D. Router

2 Answers  


When ip confliction accord in subnet which ip assigned automatically and what it called?

0 Answers  


Which protocol comes under hybrid dynamic type?

0 Answers  






What is the default size of a standard ping on a Cisco router? * A: 100 bytes * B: 32 bytes * C: 10 bytes * D: 16 bytes

2 Answers   CMS,


Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  


When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.

1 Answers  


Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link

2 Answers  


What is the maximum value of administrative you can use?

0 Answers  


What is the mac address?

0 Answers  


How is rip different from igrp?

0 Answers  


Categories