What should be the first command to create an access-list that
prevents all users on subnetwork 10.10.128.0, using subnet mask
255.255.192.0, from being able to telnet anywhere?
A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq
telnet
B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq
telnet
C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq
telnet
E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq
telnet
F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq
telnet
Answer Posted / guest
Answer: A
Is This Answer Correct ? | 5 Yes | 0 No |
Post New Answer View All Answers
Can you explain the broader steps of how L2F establishes the tunnel?
Explain the term 'unicast'.
Which decision called socket base?
I simulate ten routers r1 to r10 straightly. I want I can ping from the loop of r1 to loop of r10, but I want I cant ping r1 and r10 from inside routers.?
Can you explain L2TP?
Explain what are partial updates?
Is hsrp is cisco proprietary or introduced by ieee?
Which defined peer ip address an local subnet belong to crete?
How do you find valid hosts in a subnet?
Which dynamic type draw back is, if single link down, it removes its routing table?
Explain types of communication in ipv4?
On which mode we give debug command?
Can you explain static and dynamic tunnels?
Define the different kinds of casting
Which command we give if router ios stucked?