Thursday, October 16, 2014

Security

1. 
Which of the following is true regarding access lists applied to an interface?
A.You can place as many access lists as you want on any interface until you run out of memory.
B.You can apply only one access list on any interface.
C.One access list may be configured, per direction, for each layer 3 protocol configured on an interface.
D.You can apply two access lists to any interface.

2. 
Which command would you use to apply an access list to a router interface?
A.ip access-list 101 out
B.access-list ip 101 in
C.ip access-group 101 in
D.access-group ip 101 in
3. 
Which of the following is an example of a standard IP access list?
A.access-list 110 permit host 1.1.1.1
B.access-list 1 deny 172.16.10.1 0.0.0.0
C.access-list 1 permit 172.16.10.1 255.255.0.0
D.access-list standard 1.1.1.1
4. 
You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?
A.access-list 10 deny 192.168.160.0 255.255.224.0
B.access-list 10 deny 192.168.160.0 0.0.191.255
C.access-list 10 deny 192.168.160.0 0.0.31.255
D.access-list 10 deny 192.168.0.0 0.0.31.255
5. 
You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the commandshow running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?
A.show access-lists
B.show interface Ethernet 0
C.show ip access-lists
D.show ip interface Ethernet 0

No comments: