Which command displays the intenances using a given access list?

A. show filters

B. show ip interface

C. show active lists

D. show interface paramaters

E. configure ip access lists

F. show access-list interfaces



Which command displays the intenances using a given access list? A. show filters B. show ip in..

Answer / guest

Answer: B

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  


Identify the command to display the IP routing table? A.) show route B.) show ip route C.) show ip table route D.) show ipx route

1 Answers  


Identify the 2 commands that display the clock rate configured on the serial0 interface? A.) show serial0 B.) show interface serial0 C.) show clock rate serial 0 D.) show controllers serial 0 E.) show running-config

5 Answers  


Bridges work at what layer of the OSI model? A.) Data Link B.) Network C.) Physical D.) Application

2 Answers  


What is ad in ccna?

0 Answers  


How would you set the clock rate to 64K, on interface serial 0, from the interface configuration mode? A.) clock rate 64000 B.) bandwidth 64 C.) clock 64 D.) rate 64 E.) clock rate 64k F.) clock rate 64

1 Answers  


Each department has its own file server and the company has an enterprise server that is shared by all departments. What does a network administrator use to provide a secure separation between the management and sales departments? A. a bridge between management and sales B. routers to provide the most secure segmentation C. a hub to provide ease of management and a satisfactory alternative for network security D. an Ethernet switch to maintain secure separationthrough programming the access lists for each port of the switch

1 Answers  


Tell me how many reserve ports?

0 Answers  


What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic

1 Answers  


Which two statements about integrated services digital network (ISDN) are true? A. ISDN provides data only capability B. ISDN provides an integrated voice/data capability C. The ISDN standards define the hardware and call setup schemes for end the end digital connectivity D. Users receive more bandwidth on WANS with a leased lin of 56 Cops than with multiple B channels

1 Answers  


Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, that network is advertised with an infinite metric

1 Answers  


What is the purpose of data link layer?

0 Answers  


Categories