ACL/OSPF Flashcards
Which address is required in the command syntax of a standard ACL
source ip address
Which statement describe a difference between the operation of inbound and outbounds
Inbound acl are processed before the packets are routed while outbound acls are processed after the routing is complete.
Which three statements describes acl processing of packets
An implicit deny any rejects any packet that does not match any ACE
A packet can either be rejected or forwarding as directed by the ACE that is matched
Each statement is checked only until a match is detected or until a match is detected or until the end of the ACE list
What single access list statement matches all of the following networks?
- 168.16.0
- 168.17.0
- 168.18.0
- 168.19.0
access-list 10 permit 192.168.16.0 0.0.3.255
A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task
Router1(config)# access-list 10 permit host 192.168.15.23
Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0
If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?
8
Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)
Filter unwanted traffic before it travels onto a low-bandwidth link.
Place extended ACLs close to the source IP address of the traffic.
Place standard ACLs close to the destination IP address of the traffic.
On which router should the show access-lists command be executed?
on the router that has the ACL configured*
What is the quickest way to remove a single ACE from a named ACL
Use the no keyword and the sequence number of the ACE to be removed.
Which feature will require the use of a named standard ACL rather than a numbered standard ACL
the ability to add additional ACEs in the middle of the ACL without deleting and re-creating the list*
An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?
R1(config-line)# access-class 1 in
Which type of router connection can be secured by the access-class command
vty
What is the effect of configuring an ACL with only ACEs that deny traffic?
The ACL will block all traffic.
Which type of ACL statements are commonly reordered by the Cisco IOS as the first ACEs?
host
A network administrator is configuring an ACL to restrict access to certain servers in the data center. The intent is to apply the ACL to the interface connected to the data center LAN. What happens if the ACL is incorrectly applied to an interface in the inbound direction instead of the outbound direction?
The ACL does not perform as designed.*
When would a network administrator use the clear access-list counters command?
when troubleshooting an ACL and needing to know how many packets matched*
Which routing protocol is designed to use areas to scale large hierarchical networks?
- RIP
- EIGRP
- OSPF
- BGP
- OSPF
Which two routing protocols are classified as distance vector routing protocols? (Choose two.)
- OSPF
- EIGRP
- BGP
- IS-IS
- RIP
- EIGRP
- RIP
After a network topology change occurs, which distance vector routing protocol can send an update message directly to a single neighboring router without unnecessarily notifying other routers?
- IS-IS
- RIPv2
- EIGRP
- OSPF
- RIPv1
- EIGRP
Which feature provides secure routing updates between RIPv2 neighbors?
- unicast updates
- routing protocol authentication
- keepalive messages
- adjacency table
- routing protocol authentication
What is maintained within an EIGRP topology table?
- all routes received from neighbors
- the hop count to all networks
- the area ID of all neighbors
- the state of all links on the network
- all routes received from neighbors
What are two features of the OSPF routing protocol? (Choose two.)
- automatically summarizes networks at the classful boundaries
- has an administrative distance of 100
- calculates its metric using bandwidth
- uses Dijkstra’s algorithm to build the SPF tree
- used primarily as an EGP
- calculates its metric using bandwidth
- uses Dijkstra’s algorithm to build the SPF tree
Which two protocols are link-state routing protocols? (Choose two.)
- RIP
- OSPF
- EIGRP
- BGP
- IS-IS
- IGP
- OSPF
- IS-IS