Skip to main content

Posts

Showing posts with the label CCNA4 Chapter 5

CCNA v4 - E4 - Module 5 (100%)

1. Refer to the exhibit. What will be the effect of the configuration that is shown?   Users attempting to access hosts in the 192.168.30.0/24 network will be required to telnet to R3. 2. Which three parameters can ACLs use to filter traffic? (Choose three.)   protocol suite   source address   destination address 3. Refer to the exhibit. How does this access list process a packet with the source address 10.1.1.1 and a destination of 192.168.10.13?   It is dropped because it does not match any of the items in the ACL. 4 .Which two statements are correct about extended ACLs? (Choose two)   Extended ACLs evaluate the source and destination addresses.   Port numbers can be used to add greater definition to an ACL. 5. Where should a standard access control list be placed?   close to the destination 6. Which three statements describe ACL processing of packets? (Choose three.)   An implicit deny any rejects any packet that does not match any ACL statement.   A packet can either be rejected or

CCNA v4 - E4 - Module 5 (100%)

http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. Refer to the exhibit. What will be the effect of the configuration that is shown?    Users attempting to access hosts in the 192.168.30.0/24 network will be required to telnet to R3. 2. Which three parameters can ACLs use to filter traffic? (Choose three.)    protocol suite    source address    destination address 3. Refer to the exhibit. How does this access list process a packet with the source address 10.1.1.1 and a destination of 192.168.10.13?    It is dropped because it does not match any of the items in the ACL. 4 .Which two statements are correct about extended ACLs? (Choose two)    Extended ACLs evaluate the source and destination addresses.    Port numbers can be used to add greater definition to an ACL. http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 5. Where should a standard access control list be placed?    close to the destination 6. Which three statements describe ACL processing of packets? (Ch