Skip to main content

Posts

Setting Up Access List On Cisco Router

In this Example will open ports for need to use out of using will close it alls. This case no have inside (internal) server. Step for setting Up : Router# conf t Router(config)# access-list 100 permit tcp any any range 20 23 Router(config)# access-list 100 permit tcp any any eq 25 Router(config)# access-list 100 permit tcp any any eq 53 Router(config)# access-list 100 permit tcp any any eq 80 Router(config)# access-list 100 permit tcp any any eq 110 Router(config)# access-list 100 permit tcp any any eq 143 Router(config)# access-list 100 permit tcp any any eq 443 Router(config)# access-list 100 permit udp any any eq 53 Router(config)# access-list 100 permit udp any any eq 161 Router(config)# access-list 100 permit tcp any any eq 3306 Router(config)# access-list 100 permit icmp any any echo Router(config)# access-list 100 deny ip any any Router(config)# int f0 Router(config-if)# ip access-group 100 in This case : have inside (internal server) Server IP for this case as below : Web Serve

CCNA2 Chapter 8 (true 100%)

1. Which AAA service reduces IT operating costs by providing detailed reporting and monitoring of network user behavior, and also by keeping a record of every access connection and device configuration change across the network? authentication accreditation accounting authorization 2. Which three items are normally included when a log message is generated by a syslog client and forwarded to a syslog server? (Choose three.) date and time of message ID of sending device length of message message ID checksum field community ID 3. What is the advantage of using WPA to secure a wireless network? It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access. It uses an advanced encryption key that is never transmitted between host and access point. It is supported on older wireless hardware, thus providing maximum compatibility with enterprise equipment. It requires the MAC address of a network device that is requesting wireless access to be on a list of approved MAC a

CCNA2 Chapter 7 (100%)

1. Which two statements are true about the OSI and TCP/IP models? (Choose two.) The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model. The TCP/IP model is a theoretical model and the OSI model is based on actual protocols. **The OSI network layer is comparable to the Internet layer of the TCP/IP model. The TCP/IP model specifies protocols for the physical network interconnection. **The TCP/IP model is based on four layers and the OSI model is based on seven layers. 2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.) accessibility adaptability **availability **reliability scalability 3. User1 is sending an e-mail to User2@cisco.com. What are two characteristics of the process of sending this data? (Choose two.) It utilizes TCP port 110. A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message. **It utilizes a store and for

Cisco 640-802 CCNA

Testkingworld.com 640-802 Practice Questions are designed with questions, coupled with precise, logical and verified answer. testkingworld.com's 640-802 practice exam provides you with an examination experience like no other. To take a more authentic exam, you would have to take the exam itself, in an exam center! Furthermore our Cisco 640-802 braindumps exam is always updated to provide you the most actual information available and this is done with the help of our testking professionals team of certification experts, technical staff, and comprehensive language masters who are always in-touch with the changes in the 640-802 exam. So the true way for passing the 640-802 exam is to get in-touch with the testking to obtain the certification exam questions that will lead to your certification success. Easiest way to get these certifications is to log on to the 640-802 testking and download the 640-802 test questions to do Cisco 640-802 practice exam to obtain your free 640-802 exam ce

CCNA2 Chapter 6 V4.1 (true 100%)

Chapter 6 With 100% Accurate Answers 1. Which command is used to view the RIP routing protocol settings and configuration? show version show ip route show interface **show ip protocols 2. Refer to the exhibit. What is the maximum number of RIP routers that could separate HostA and HostB and still leave the hosts with connectivity to each other? 14 15 **16 17 3. In which situation would a company register for its own autonomous system number (ASN)? when the company's ISP adds connection points to the Internet when additional routers are added to the corporate internetwork when more than one interior routing protocol is used **when the company uses two or more ISPs 4. Consider this routing table entry R 172.16.1.0/24 [120/1] via 200.1.1.1 00:00:27 Serial0/1 What type of route is this? a static route a default route **a RIP route an OSPF route an EIGRP route a directly-connected route 5. What is the difference between interior and exterior routing protocols? Exterior routing protocols

CCNA2 Chapter 5 V4.1 (true 100%)

Chapter 5 With 100% Accurate Answers 1. In what two ways does SDM differ from the IOS CLI? (Choose two.) **SDM is used for in-band management only. The IOS CLI can be used for in-band and out-of-band management. SDM is accessed through a Telnet application. The IOS CLI is accessed through a web browser. SDM is available for all router platforms. The IOS CLI is available for a limited number of Cisco devices. **SDM utilizes GUI buttons and text boxes. The IOS CLI requires the use of text-based commands. SDM is used for advanced configuration tasks. The IOS CLI is preferred for initial basic device configuration. 2. Which mode will a configured router display at login? global configuration mode setup mode ROM monitor mode **user EXEC mode 3. Refer to the exhibit. Which password or passwords will be encrypted as a result of the configuration that is shown? virtual terminal only enable mode only console and virtual terminal only enable mode and virtual terminal only the service password **

CCNA2 Chapter 4 V4.1

1. In an 8 bit binary number, what is the total number of combinations of the eight bits? 128 254 255 **256 512 1024 2. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 **11100111 11100101 11101110 3. How many usable hosts are available given a Class C IP address with the default subnet mask? **254 255 256 510 511 512 4. Which statement describes NAT overload or PAT? Each internal address is dynamically translated to an individual external IP address. A single internal address is always translated to the same unique external IP address. **Many internal addresses can be translated to a single IP address using different port assignments. Many internal addresses are statically assigned a single IP address and port to use for communications. 5. Which IPv4 class of addresses provides the most networks? Class A Class B **Class C Class D Class E 6. Which statement accurately describes public IP addresses? Publ