What should be the first command to create an access-list that
prevents all users on subnetwork 10.10.128.0, using subnet mask
255.255.192.0, from being
able to telnet anywhere?
A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq
telnet
B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq
telnet
C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq
telnet
E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq
telnet
F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq
telnet
Answer Posted / guest
Answer: A
| Is This Answer Correct ? | 1 Yes | 3 No |
Post New Answer View All Answers
What is the syntax of ipv4?
Explain what is the size of hello packets in eigrep protocol?
What is the advantage of vlan?
Does a bridge divides a network into smaller segments?
What is half duplex and full duplex?
Tell me which protocol comes under hybrid dynamic type?
Mention what is the difference between dynamic ip and static ip addressing?
Which mathematically form used inipv6?
What is the size of ipv4?
Utilizing RIP, what is the limit when it comes to the number of hops?
What are the disadvantages of symmetric algorithms?
What is subnetting? Why is it used?
What is the difference between lan, man, and wan?
What are the things that can be accessed in a CISCO router’s identifying information?
Explain the difference between half-duplex and full-duplex?