What should be the first command to create an access-list that
prevents all users on subnetwork 10.10.128.0, using subnet mask
255.255.192.0, from being
able to telnet anywhere?
A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq
telnet
B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq
telnet
C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq
telnet
E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq
telnet
F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq
telnet
Answer Posted / guest
Answer: A
Is This Answer Correct ? | 1 Yes | 3 No |
Post New Answer View All Answers
What is the maximum request timer?
Tell me when we use extended access-list?
Tell me which protocol called rapid protocol?
How does L2TP process?
In how many ways you can access router?
What port does rip use?
Which command we give on privilege mode for coming back to user execution mode?
Which protocol comes under hybrid dynamic type?
Which command we give for live view of remote site routers?
Explain what is eigrp?
What is the name of best path in eigrp protocol?
What is HDLC?
Which works router do?
Brielfly explain the conversion steps in data encapsulation
What is the network brouter?