Hoofdstuk 7 Flashcards
In which configuration would an outbound ACL placement be preferred over an inbound ACL placement?
when the ACL is applied to an outbound interface to filter packets coming from multiple inbound interfaces before the packets exit the interface when a router has more than one ACL when an outbound ACL is closer to the source of the traffic flow when an interface is filtered by an outbound ACL and the network attached to the interface is the source network being filtered within the ACL
when the ACL is applied to an outbound interface to filter packets coming from multiple inbound interfaces before the packets exit the interface
Which address is required in the command syntax of a standard ACL?
source MAC address destination MAC address source IP address destination IP address
source IP address
Which statement describes a difference between the operation of inbound and outbound ACLs?
In contrast to outbound ALCs, inbound ACLs can be used to filter packets with multiple criteria. Inbound ACLs can be used in both routers and switches but outbound ACLs can be used only on routers. Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed. On a network interface, more than one inbound ACL can be configured but only one outbound ACL can be configured.
Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.
Which three statements describe ACL processing of packets? (Choose three.)
An implicit deny any rejects any packet that does not match any ACE. A packet can either be rejected or forwarded as directed by the ACE that is matched. A packet that has been denied by one ACE can be permitted by a subsequent ACE. A packet that does not match the conditions of any ACE will be forwarded by default. Each statement is checked only until a match is detected or until the end of the ACE list. Each packet is compared to the conditions of every ACE in the ACL before a forwarding decision is made.
An implicit deny any rejects any packet that does not match any ACE.
A packet can either be rejected or forwarded as directed by the ACE that is matched.
Each statement is checked only until a match is detected or until the end of the ACE list.
What single access list statement matches all of the following networks?
- 168.16.0
- 168.17.0
- 168.18.0
- 168.19.0
access-list 10 permit 192.168.16.0 0.0.3.255 access-list 10 permit 192.168.16.0 0.0.0.255 access-list 10 permit 192.168.16.0 0.0.15.255 access-list 10 permit 192.168.0.0 0.0.15.255
access-list 10 permit 192.168.16.0 0.0.3.255
A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)
Router1(config)# access-list 10 permit host 192.168.15.23 Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0 Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.255 Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.0 Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.255
Router1(config)# access-list 10 permit host 192.168.15.23
Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0
If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?
4 6 8 12 16
8
Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)
Place standard ACLs close to the source IP address of the traffic. Place extended ACLs close to the destination IP address of the traffic. Filter unwanted traffic before it travels onto a low-bandwidth link. Place extended ACLs close to the source IP address of the traffic. Place standard ACLs close to the destination IP address of the traffic. For every inbound ACL placed on an interface, there should be a matching outbound ACL.
Filter unwanted traffic before it travels onto a low-bandwidth link.
Place extended ACLs close to the source IP address of the traffic.
Place standard ACLs close to the destination IP address of the traffic.
Refer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached to R1?
access-list 1 permit 192.168.10.0 0.0.0.63 access-list 1 permit 192.168.10.96 0.0.0.31 access-list 1 permit 192.168.10.0 0.0.0.255 access-list 1 permit 192.168.10.128 0.0.0.63
access-list 1 permit 192.168.10.96 0.0.0.31
Refer to the exhibit. If the network administrator created a standard ACL that allows only devices that connect to the R2 G0/0 network access to the devices on the R1 G0/1 interface, how should the ACL be applied?
inbound on the R2 G0/0 interface outbound on the R1 G0/1 interface inbound on the R1 G0/1 interface outbound on the R2 S0/0/1 interface
outbound on the R1 G0/1 interface
Refer to the following output. What is the significance of the 4 match(es) statement?
R1#
10 permit 192.168.1.56 0.0.0.7
20 permit 192.168.1.64 0.0.0.63 (4 match(es))
30 deny any (8 match(es))
Four packets have been denied that have been sourced from any IP address. Four packets have been denied that are destined for the 192.168.1.64 network. Four packets have been allowed through the router from PCs in the network of 192.168.1.64. Four packets have been allowed through the router to reach the destination network of 192.168.1.64/26.
Four packets have been allowed through the router from PCs in the network of 192.168.1.64.
On which router should the show access-lists command be executed?
on the router that routes the packet referenced in the ACL to the final destination network on the router that routes the packet referenced in the ACL from the source network on any router through which the packet referenced in the ACL travels on the router that has the ACL configured
on the router that has the ACL configured
What is the quickest way to remove a single ACE from a named ACL?
Use the no keyword and the sequence number of the ACE to be removed. Use the no access-list command to remove the entire ACL, then recreate it without the ACE. Copy the ACL into a text editor, remove the ACE, then copy the ACL back into the router. Create a new ACL with a different number and apply the new ACL to the router interface.
Use the no keyword and the sequence number of the ACE to be removed.
Which feature will require the use of a named standard ACL rather than a numbered standard ACL?
the ability to filter traffic based on a specific protocol the ability to filter traffic based on an entire protocol suite and destination the ability to specify source and destination addresses to use when identifying traffic the ability to add additional ACEs in the middle of the ACL without deleting and re-creating the list
the ability to add additional ACEs in the middle of the ACL without deleting and re-creating the list
An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?
R1(config-if)# ip access-group 1 in R1(config-if)# ip access-group 1 out R1(config-line)# access-class 1 in R1(config-line)# access-class 1 out
R1(config-line)# access-class 1 in