Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which two commands show your access lists? (Choose two)

A. show filters

B. show access-lists

C. show ip access-lists

D. show running-config

Answers were Sorted based on User's Feedback



Which two commands show your access lists? (Choose two) A. show filters B. show access-lists ..

Answer / guest

Answer: B, D

Is This Answer Correct ?    2 Yes 0 No

Which two commands show your access lists? (Choose two) A. show filters B. show access-lists ..

Answer / biswajit biswas, kolkata

sh access-lists : will tell you to view the entire contents
of all access lists

sh ip access-lists : will tell you on which porthave access
list applied

sh running-config : will also can be used to monitor access
list.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify 3 characteristics of the Network layer (OSI layer 3)? A.) Connnection oriented B.) Path determination C.) Supports multiplexing D.) Manages sessions E.) Packet forwarding

1 Answers  


What does the command “IP name-server 255.255.255.255&#8243; accomplish? a.It disables domain name lookup. b.It sets the domain name lookup to be a local broadcast. c.This is an illegal command. d.The command is now defunct and has been replaced by “IP server-name ip any”

5 Answers  


On which layer does L2F, PPTP and L2TP operate?

0 Answers   CCIE,


Which protocol is used for booting diskless workstations? A.) IP B.) ARP C.) RARP D.) TCP E.) SNMP

2 Answers  


Which IEEE standard is used to define Wi-Fi? A. IEEE 802.3 B. IEEE 802.5 C. IEEE 802.11h D. IEEE 802.11c E. IEEE 802.11

13 Answers   Infosys,


Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link

2 Answers  


What are the different ways authentication mechanism in VPN?

0 Answers   CCIE,


On an ISDN BRI interface, the control channel is the 'D' channel. What is the rate of this channel? A.) 64 Kbps B.) 1.544 Mbps C.) 128 Kbps D.) 2.048 Mbps E.) 16 Kbps

2 Answers  


Identify 3 IP routing protocols? A.) RIP B.) AURP C.) OSPF D.) IGRP E.) ARP F.) ICMP

3 Answers  


Switching methods include cut-through, store and forward, and a modified version of the first two methods. Which statement about switching methods is true? A. The store and forward method has low latency B. The cut through method of switching has high latency C. The modified version holds the packet in memory until 50 percent of the packet reaches the switch D. The modified version holds the packet in memory until the data spoon of the packet reaches the switch

3 Answers  


What does the term "attenuation" mean in data communication? 1 loss of signal strength as distance increases 2 time for a signal to reach its destination 3 leakage of signals from one cable pair to another 4 strengthening of a signal by a networking device

3 Answers  


What is true when creating static route? A.) The mask parameter is optional B.) The administrative distance is required C.) The gateway parameter is required D.) The administrative distance is optional

1 Answers  


Categories