chapter 4 Flashcards

1
Q

Which range represents all the IP addresses that are affected when network 10.120.160.0 with a wildcard mask of 0.0.7.255 is used in an ACE?

  1. 120.160.0 to 10.120.168.0
  2. 120.160.0 to 10.127.255.255
  3. 120.160.0 to 10.120.191.255
  4. 120.160.0 to 10.120.167.255
A

10.120.160.0 to 10.120.167.255*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What two functions describe uses of an access control list? (Choose two.)

ACLs assist the router in determining the best path to a destination.
Standard ACLs can restrict access to specific applications and ports.
ACLs provide a basic level of security for network access.
ACLs can permit or deny traffic based upon the MAC address originating on the router.
ACLs can control which areas a host can access on a network.

A

ACLs provide a basic level of security for network access.

ACLs can control which areas a host can access on a network.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two statements describe the effect of the access control list wildcard mask 0.0.0.15? (Choose two.)

The first 28 bits of a supplied IP address will be matched.
The last four bits of a supplied IP address will be matched.
The first 28 bits of a supplied IP address will be ignored.
The last four bits of a supplied IP address will be ignored.
The last five bits of a supplied IP address will be ignored.
The first 32 bits of a supplied IP address will be matched.

A

The first 28 bits of a supplied IP address will be matched.*

The last four bits of a supplied IP address will be ignored.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Refer to the exhibit. A network administrator is configuring an ACL to limit the connection to R1 vty lines to only the IT group workstations in the network 192.168.22.0/28. The administrator verifies the successful Telnet connections from a workstation with IP 192.168.22.5 to R1 before the ACL is applied. However, after the ACL is applied to the interface Fa0/0, Telnet connections are denied. What is the cause of the connection failure?

The enable secret password is not configured on R1.
The IT group network is included in the deny statement.
The permit ACE specifies a wrong port number.
The permit ACE should specify protocol ip instead of tcp.
The login command has not been entered for vty lines.

A

The IT group network is included in the deny statement.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network administrator is designing an ACL. The networks 192.168.1.0/25, 192.168.0.0/25, 192.168.0.128/25, 192.168.1.128/26, and 192.168.1.192/26 are affected by the ACL. Which wildcard mask, if any, is the most efficient to use when specifying all of these networks in a single ACL permit entry?

  1. 0.0.127
  2. 0.0.255
  3. 0.1.255
  4. 0.255.255
A

0.0.1.255*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

he exhibit shows router R2 connected through int fa0/0 to a switch which in turn is connected to host with an IP address 192.168.1.1 /24. R2 is connected to another switch through interface fa0/1 and the switch is connected to a server with the IP address 192.168.2.1 /24.Refer to the exhibit. A network administrator wants to permit only host 192.168.1.1 /24 to be able to access the server 192.168.2.1 /24. Which three commands will achieve this using best ACL placement practices? (Choose three.)

R2(config-if)# ip access-group 101 out
R2(config)# access-list 101 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0
R2(config)# interface fastethernet 0/1
R2(config)# interface fastethernet 0/0*
R2(config)# access-list 101 permit ip host 192.168.1.1 host 192.168.2.1
R2(config-if)# ip access-group 101 in
R2(config)# access-list 101 permit ip any any

A

R2(config)# interface fastethernet 0/0*
R2(config)# access-list 101 permit ip host 192.168.1.1 host 192.168.2.1*
R2(config-if)# ip access-group 101 in*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which two statements are correct about extended ACLs? (Choose two)

Extended ACLs evaluate the source and destination addresses.
Port numbers can be used to add greater definition to an ACL.
Extended ACLs end with an implicit permit statement.
Extended ACLs use a number range from 1-99.
Multiple ACLs can be placed on the same interface as long as they are in the same direction.

A

Extended ACLs evaluate the source and destination addresses.*

Port numbers can be used to add greater definition to an ACL.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which three values or sets of values are included when creating an extended access control list entry? (Choose three.)
source address and wildcard mask
access list number between 100 and 199
source subnet mask and wildcard mask
access list number between 1 and 99
destination address and wildcard mask
destination subnet mask and wildcard mask
default gateway address and wildcard mask

A

source address and wildcard mask*

access list number between 100 and 199*

destination address and wildcard mask*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refer to the exhibit. This ACL is applied on traffic outbound from the router on the interface that directly connects to the 10.0.70.5 server. A request for information from a secure web page is sent from host 10.0.55.23 and is destined for the 10.0.70.5 server. Which line of the access list will cause the router to take action (forward the packet onward or drop the packet)?

1
3
2
the deny ip any any that is at the end of every ACL
5
4
A

3*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet?

access-list 103 deny tcp host 192.168.10.0 any eq 23
access-list 103 permit tcp host 192.168.10.1 eq 80
access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80
access-list 103 deny tcp ​192.168.10.0 0.0.0.255 any eq 23
access-list 103 permit tcp 192.168.10.0 0.0.0.255 any eq 80
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23
access-list 103 permit 192.168.10.0 0.0.0.255 host 172.17.80.1
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq telnet​​

A

access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80
access-list 103 deny tcp ​192.168.10.0 0.0.0.255 any eq 23*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two packet filters could a network administrator use on an IPv4 extended ACL? (Choose two.)

destination UDP port number
source TCP hello address
ICMP message type
destination MAC address
computer type
A
  • destination UDP port number

* ICMP message type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two ACE commands will block traffic that is destined for a web server which is listening to default ports? (Choose two.)

access-list 110 deny tcp any any lt 80
access-list 110 deny tcp any any eq 21
access-list 110 deny tcp any any eq https
access-list 110 deny tcp any any gt 75
access-list 110 deny tcp any any gt 443
A

access-list 110 deny tcp any any eq https*

access-list 110 deny tcp any any gt 75*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which feature is unique to IPv6 ACLs when compared to those of IPv4 ACLs?

the use of wildcard masks
an implicit permit of neighbor discovery packets
an implicit deny any any ACE
the use of named ACL ACE

A

an implicit permit of neighbor discovery packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What two ACEs could be used to deny IP traffic from a single source host 10.1.1.1 to the 192.168.0.0/16 network? (Choose two.)

access-list 100 deny ip 10.1.1.1 255.255.255.255 192.168.0.0 0.0.255.255
access-list 100 deny ip 10.1.1.1 0.0.0.0 192.168.0.0 0.0.255.255
access-list 100 deny ip 192.168.0.0 0.0.255.255 host 10.1.1.1
access-list 100 deny ip host 10.1.1.1 192.168.0.0 0.0.255.255
access-list 100 deny ip 192.168.0.0 0.0.255.255 10.1.1.1 0.0.0.0
access-list 100 deny ip 192.168.0.0 0.0.255.255 10.1.1.1 255.255.255.255

A

access-list 100 deny ip 10.1.1.1 0.0.0.0 192.168.0.0 0.0.255.255*

access-list 100 deny ip host 10.1.1.1 192.168.0.0 0.0.255.255*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Refer to the exhibit. The IPv6 access list LIMITED_ACCESS is applied on the S0/0/0 interface of R1 in the inbound direction. Which IPv6 packets from the ISP will be dropped by the ACL on R1?

ICMPv6 packets that are destined to PC1
neighbor advertisements that are received from the ISP router
HTTPS packets to PC1
packets that are destined to PC1 on port 80

A

ICMPv6 packets that are destined to PC1*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

hich command is used to activate an IPv6 ACL named ENG_ACL on an interface so that the router filters traffic prior to accessing the routing table?

ipv6 access-class ENG_ACL in
ipv6 traffic-filter ENG_ACL out
ipv6 traffic-filter ENG_ACL in
ipv6 access-class ENG_ACL out

A

ipv6 traffic-filter ENG_ACL in*

17
Q

What is the wildcard mask that is associated with the network 192.168.12.0/24?

  1. 0.0.255
  2. 0.255.255
  3. 0.0.256
  4. 255.255.0
A

*0.0.0.255

18
Q

Which IPv6 ACL command entry will permit traffic from any host to an SMTP server on network 2001:DB8:10:10::/64?

permit tcp host 2001:DB8:10:10::100 any eq 23
permit tcp any host 2001:DB8:10:10::100 eq 25
permit tcp any host 2001:DB8:10:10::100 eq 23
permit tcp host 2001:DB8:10:10::100 any eq 25

A

permit tcp any host 2001:DB8:10:10::100 eq 25

19
Q

n applying an ACL to a router interface, which traffic is designated as outbound?

traffic for which the router can find no routing table entry
traffic that is going from the destination IP address into the router
traffic that is leaving the router and going toward the destination host
traffic that is coming from the source IP address into the router

A

traffic that is leaving the router and going toward the destination host*

20
Q

destination 202.16.83.131 http
the router will drop the packet
the router will forward the packet

A

the router will drop the packet

21
Q

destination 202.16.83.131 http
the router will drop the packet
the router will forward the packet

A

the router will drop the packet

22
Q

destination 192.168.83.157 telnet
the router will drop the packet
the router will forward the packet

A

the router will drop the packet

23
Q

destination 192.168.83.189 ftp
the router will drop the packet
the router will forward the packet

A

the router will forward the packet

24
Q

hosts in subnet with the subnet mask 255.255.252.0

A

192.168.5.0 0.0.3 area 0

25
Q

at IP address bits must match exactly

A

host 192.168.15.2

26
Q

the first valid host address in a subnet

A

192.168.55.65 255.255.255.240

27
Q

subnetwork address of a subnet with 14 valid host addresses

A

192.168.15.144 0.0.0.15

28
Q

addresses with a subnet mask of 255.255.255.248

A

192.168.3.64 0.0.0.7