How do i decide if an extended access-list is in or out?
Answer / jitendera kuamr sinha
i canot understand your question
if your question is that where should we apply the extended
access list the the answer is as closer to source that is
inbond access list you can make it outbond too(see ccna
toddlamlee chapter acces list)but it is a simple conventions
non thing more then that.just like that
a hen is crossing the road or a road is crossing the hen
this depend open the frame of reference.
so this is a convention
| Is This Answer Correct ? | 1 Yes | 0 No |
intial information of packey occur on which layer application sessions physical mine answer physical
When a router knows the IP address, but does not know the MAC address of the device it wishes to contact, it uses the ARP (Address resolution protocol) to determine the MAC address. After it learns the MAC address, it stores this information in the ARP cache. What is the command to view the ARP cache? A.) sh mac B.) show cache C.) show arp D.) sh arp interfaces E.) show ip cache
What are two characteristics of the RARP protocol? (Choose two) A. it generates parameter problem messages B. it maps IP addresses to Ethernet addresses C. it maps Ethernet addresses to IP addresses D. it is implemented directly on top of the data link layer
Identify the prompt displayed if in privileged exec mode? A.) Router(config)# B.) Router# C.) Router> D.) Router(priv)#
What are the different types of the password used in securing a cisco router?
In STP the Root Bridge Sends the BPDU in Every 2 Sec,In BPDU What kind of Information is i.e. What kind of information BPDU Contains?
which utility should use to test whether TCP/IP has been initialized on a system.friends plz post the answer with explaination..
Q: why are switch trunking modes ( dynamic auto , dynamic desirable )used in switch while trunking? if only negotiation is the factor it can be done with one mode as well ie dynamic desirable . but why we need dynamic auto. coz it dsnt negotiates ..at all please post answer asap thanks :
Which of the following are examples of ICMP? A.) Traceroute B.) Web Browsing C.) Ping D.) Telnet E.) Destination Unreachable message from a router F.) Inverse Tunnels
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
Does a bridge divide a network into smaller segments?
Which of the following are examples of the Transport Layer? A.) Token Ring B.) UDP C.) TCP D.) IP E.) SQL F.) LLC