Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


How do i decide if an extended access-list is in or out?



How do i decide if an extended access-list is in or out? ..

Answer / jitendera kuamr sinha

i canot understand your question
if your question is that where should we apply the extended
access list the the answer is as closer to source that is
inbond access list you can make it outbond too(see ccna
toddlamlee chapter acces list)but it is a simple conventions
non thing more then that.just like that

a hen is crossing the road or a road is crossing the hen
this depend open the frame of reference.
so this is a convention

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

intial information of packey occur on which layer application sessions physical mine answer physical

1 Answers  


When a router knows the IP address, but does not know the MAC address of the device it wishes to contact, it uses the ARP (Address resolution protocol) to determine the MAC address. After it learns the MAC address, it stores this information in the ARP cache. What is the command to view the ARP cache? A.) sh mac B.) show cache C.) show arp D.) sh arp interfaces E.) show ip cache

2 Answers  


What are two characteristics of the RARP protocol? (Choose two) A. it generates parameter problem messages B. it maps IP addresses to Ethernet addresses C. it maps Ethernet addresses to IP addresses D. it is implemented directly on top of the data link layer

1 Answers  


Identify the prompt displayed if in privileged exec mode? A.) Router(config)# B.) Router# C.) Router> D.) Router(priv)#

2 Answers  


What are the different types of the password used in securing a cisco router?

0 Answers  


In STP the Root Bridge Sends the BPDU in Every 2 Sec,In BPDU What kind of Information is i.e. What kind of information BPDU Contains?

3 Answers  


which utility should use to test whether TCP/IP has been initialized on a system.friends plz post the answer with explaination..

3 Answers  


Q: why are switch trunking modes ( dynamic auto , dynamic desirable )used in switch while trunking? if only negotiation is the factor it can be done with one mode as well ie dynamic desirable . but why we need dynamic auto. coz it dsnt negotiates ..at all please post answer asap thanks :

2 Answers  


Which of the following are examples of ICMP? A.) Traceroute B.) Web Browsing C.) Ping D.) Telnet E.) Destination Unreachable message from a router F.) Inverse Tunnels

1 Answers  


Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z

2 Answers  


Does a bridge divide a network into smaller segments?

0 Answers  


Which of the following are examples of the Transport Layer? A.) Token Ring B.) UDP C.) TCP D.) IP E.) SQL F.) LLC

2 Answers  


Categories