Hoofdstuk 7 Flashcards

1
Q

In which configuration would an outbound ACL placement be preferred over an inbound ACL placement?

when the ACL is applied to an outbound interface to filter packets coming from multiple inbound interfaces before the packets exit the interface
when a router has more than one ACL
when an outbound ACL is closer to the source of the traffic flow
when an interface is filtered by an outbound ACL and the network attached to the interface is the source network being filtered within the ACL
A

when the ACL is applied to an outbound interface to filter packets coming from multiple inbound interfaces before the packets exit the interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which address is required in the command syntax of a standard ACL?

source MAC address
destination MAC address
source IP address
destination IP address
A

source IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which statement describes a difference between the operation of inbound and outbound ACLs?

In contrast to outbound ALCs, inbound ACLs can be used to filter packets with multiple criteria.
Inbound ACLs can be used in both routers and switches but outbound ACLs can be used only on routers.
Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.
On a network interface, more than one inbound ACL can be configured but only one outbound ACL can be configured.
A

Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which three statements describe ACL processing of packets? (Choose three.)

An implicit deny any rejects any packet that does not match any ACE.
A packet can either be rejected or forwarded as directed by the ACE that is matched.
A packet that has been denied by one ACE can be permitted by a subsequent ACE.
A packet that does not match the conditions of any ACE will be forwarded by default.
Each statement is checked only until a match is detected or until the end of the ACE list.
Each packet is compared to the conditions of every ACE in the ACL before a forwarding decision is made.
A

An implicit deny any rejects any packet that does not match any ACE.
A packet can either be rejected or forwarded as directed by the ACE that is matched.
Each statement is checked only until a match is detected or until the end of the ACE list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What single access list statement matches all of the following networks?

  1. 168.16.0
  2. 168.17.0
  3. 168.18.0
  4. 168.19.0
access-list 10 permit 192.168.16.0 0.0.3.255
access-list 10 permit 192.168.16.0 0.0.0.255
access-list 10 permit 192.168.16.0 0.0.15.255
access-list 10 permit 192.168.0.0 0.0.15.255
A

access-list 10 permit 192.168.16.0 0.0.3.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)

Router1(config)# access-list 10 permit host 192.168.15.23
Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0
Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.255
Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.0
Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.255
A

Router1(config)# access-list 10 permit host 192.168.15.23

Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?

    4
    6
    8
    12
    16
A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)

Place standard ACLs close to the source IP address of the traffic.
Place extended ACLs close to the destination IP address of the traffic.
Filter unwanted traffic before it travels onto a low-bandwidth link.
Place extended ACLs close to the source IP address of the traffic.
Place standard ACLs close to the destination IP address of the traffic.
For every inbound ACL placed on an interface, there should be a matching outbound ACL.
A

Filter unwanted traffic before it travels onto a low-bandwidth link.
Place extended ACLs close to the source IP address of the traffic.
Place standard ACLs close to the destination IP address of the traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached to R1?

access-list 1 permit 192.168.10.0 0.0.0.63
access-list 1 permit 192.168.10.96 0.0.0.31
access-list 1 permit 192.168.10.0 0.0.0.255
access-list 1 permit 192.168.10.128 0.0.0.63
A

access-list 1 permit 192.168.10.96 0.0.0.31

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Refer to the exhibit. If the network administrator created a standard ACL that allows only devices that connect to the R2 G0/0 network access to the devices on the R1 G0/1 interface, how should the ACL be applied?

inbound on the R2 G0/0 interface
outbound on the R1 G0/1 interface
inbound on the R1 G0/1 interface
outbound on the R2 S0/0/1 interface
A

outbound on the R1 G0/1 interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Refer to the following output. What is the significance of the 4 match(es) statement?
R1#
10 permit 192.168.1.56 0.0.0.7
20 permit 192.168.1.64 0.0.0.63 (4 match(es))
30 deny any (8 match(es))

Four packets have been denied that have been sourced from any IP address.
Four packets have been denied that are destined for the 192.168.1.64 network.
Four packets have been allowed through the router from PCs in the network of 192.168.1.64.
Four packets have been allowed through the router to reach the destination network of 192.168.1.64/26.
A

Four packets have been allowed through the router from PCs in the network of 192.168.1.64.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

On which router should the show access-lists command be executed?

on the router that routes the packet referenced in the ACL to the final destination network
on the router that routes the packet referenced in the ACL from the source network
on any router through which the packet referenced in the ACL travels
on the router that has the ACL configured
A

on the router that has the ACL configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the quickest way to remove a single ACE from a named ACL?

Use the no keyword and the sequence number of the ACE to be removed.
Use the no access-list command to remove the entire ACL, then recreate it without the ACE.
Copy the ACL into a text editor, remove the ACE, then copy the ACL back into the router.
Create a new ACL with a different number and apply the new ACL to the router interface.
A

Use the no keyword and the sequence number of the ACE to be removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which feature will require the use of a named standard ACL rather than a numbered standard ACL?

the ability to filter traffic based on a specific protocol
the ability to filter traffic based on an entire protocol suite and destination
the ability to specify source and destination addresses to use when identifying traffic
the ability to add additional ACEs in the middle of the ACL without deleting and re-creating the list
A

the ability to add additional ACEs in the middle of the ACL without deleting and re-creating the list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

R1(config-if)# ip access-group 1 in
R1(config-if)# ip access-group 1 out
R1(config-line)# access-class 1 in
R1(config-line)# access-class 1 out
A

R1(config-line)# access-class 1 in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of router connection can be secured by the access-class command?

vty
console
serial
Ethernet
A

vty

17
Q

Consider the following output for an ACL that has been applied to a router via the access-class in command. What can a network administrator determine from the output that is shown?
R1#
Standard IP access list 2
10 permit 192.168.10.0, wildcard bits 0.0.0.255 (2 matches)
20 deny any (1 match)

Two devices connected to the router have IP addresses of 192.168.10.x.
Traffic from one device was not allowed to come into one router port and be routed outbound a different router port.
Two devices were able to use SSH or Telnet to gain access to the router.
Traffic from two devices was allowed to enter one router port and be routed outbound to a different router port.
A

Two devices were able to use SSH or Telnet to gain access to the router.

18
Q

Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?

Manually add the new deny ACE with a sequence number of 5.
Manually add the new deny ACE with a sequence number of 15.
Create a second access list denying the host and apply it to the same interface.
Add a deny any any ACE to access-list 1.
A

Manually add the new deny ACE with a sequence number of 5.

19
Q

Refer to the exhibit. An ACL was configured on R1 with the intention of denying traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0/24. All other traffic into subnet 172.16.3.0/24 should be permitted. This standard ACL was then applied outbound on interface Fa0/0. Which conclusion can be drawn from this configuration?​

Only traffic from the 172.16.4.0/24 subnet is blocked, and all other traffic is allowed.​
An extended ACL must be used in this situation.
The ACL should be applied to the FastEthernet 0/0 interface of R1 inbound to accomplish the requirements.
All traffic will be blocked, not just traffic from the 172.16.4.0/24 subnet.
The ACL should be applied outbound on all interfaces of R1.
A

All traffic will be blocked, not just traffic from the 172.16.4.0/24 subnet.

20
Q

Refer to the exhibit. What will happen to the access list 10 ACEs if the router is rebooted before any other commands are implemented?

The ACEs of access list 10 will be deleted.
The ACEs of access list 10 will not be affected.
The ACEs of access list 10 will be renumbered.
The ACEs of access list 10 wildcard masks will be converted to subnet masks.
A

The ACEs of access list 10 will be renumbered.

21
Q

What is the effect of configuring an ACL with only ACEs that deny traffic?

The ACL will permit any traffic that is not specifically denied.
The ACL will block all traffic.
The ACL must be applied inbound only.
The ACL must be applied outbound only.
A

The ACL will block all traffic.

22
Q

Which type of ACL statements are commonly reordered by the Cisco IOS as the first ACEs?

host
range
permit any
lowest sequence number
A

host

23
Q

A network administrator is configuring an ACL to restrict access to certain servers in the data center. The intent is to apply the ACL to the interface connected to the data center LAN. What happens if the ACL is incorrectly applied to an interface in the inbound direction instead of the outbound direction?

All traffic is denied.
All traffic is permitted.
The ACL does not perform as designed.
The ACL will analyze traffic after it is routed to the outbound interface.
A

The ACL does not perform as designed.

24
Q

When would a network administrator use the clear access-list counters command?

when obtaining a baseline
when buffer memory is low
when an ACE is deleted from an ACL
when troubleshooting an ACL and needing to know how many packets matched
A

when troubleshooting an ACL and needing to know how many packets matched

25
Q

MATCH:
hosts in a subset with the subnet mask 255.255.252.0
all IP address bits must match exactly
the first valid hostaddress in a subnet
subnetwork address of a subnet with 14 valid host addresses
addresses with a subset mask of 255.255.255.248

192.168.15.65 255.255.255.240
192.168.15.144 0.0.0.15
host 192.168.15.12
192.168.5.0 0.0.3.255
192.168.3.64 0.0.0.7
192.168.100.63 255.255.255.192

A

192.168.15.65 255.255.255.240 –> the first valid hostaddress in a subnet
192.168.15.144 0.0.0.15 –> subnetwork address of a subnet with 14 valid host addresses
host 192.168.15.12 –> all IP address bits must match exactly
192.168.5.0 0.0.3.255 –> hosts in a subset with the subnet mask 255.255.252.0
192.168.3.64 0.0.0.7 –> addresses with a subset mask of 255.255.255.248

26
Q

Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)

Place extended ACLs close to the destination IP address of the traffic.
Place standard ACLs close to the destination IP address of the traffic.
Place standard ACLs close to the source IP address of the traffic.
For every inbound ACL placed on an interface, there should be a matching outbound ACL.
Filter unwanted traffic before it travels onto a low-bandwidth link.
Place extended ACLs close to the source IP address of the traffic.

A

Place standard ACLs close to the destination IP address of the traffic.
Filter unwanted traffic before it travels onto a low-bandwidth link.
Place extended ACLs close to the source IP address of the traffic.

27
Q

A network administrator has examined the routing table of a router and noted that the entry for the destination network 172.16.4.0/24 begins with the letter D. What does this letter signify?

The route to network 172.16.4.0/24 is directly connected.
The router source was learned dynamically.
That is the direct router for packets to that network.
Tha router to this network is configured statically on the router.

A

The route source was learned dynamically.

28
Q

What are two functions of dynamic routing protocols? (Choose two.)

To maintain routing tables
To assure low router overhead
To avoid exposing network information
To discover the network
To choose the path that is specifiedbby the administrator
A

To maintain routing tables

To discover the network

29
Q

What is the purpose of classifying Cisco IP routing table entries as ultimate route, level 1 route, level1 parent route, and level 2 child routes?

To enable the implementation of dynamic routing protocols
To explain the operation of the routing table as a flat database
To enable Cisco rputers to implement both IPv4 and IPv6 routing
To explain the operation of the heirarchical structure of the routing table

A

To explain the operation of the heirarchical structure of the routing table

30
Q

Which statements are true for OSPH Hello packets? (Choose two.)

They arebused to negotiate correct parameters among neighboring interfaces.
They are used to maintain the neighbor relationship.
They are used to determine the complete network topology.
They are used for dynamic neighbor discovery.
They are used to flood link-state information to all neighbors.

A

They are used to maintain neighbor relationship.

They are used for dynamic neighbor discovery.

31
Q

Which factor directly affects the time to convergence?

The data link layer protocol used
Number of hosts
Size of the network
Type of application used

A

Size of the network

32
Q

Which classless routing protocol supports VLSM and CIDR, bounded and triggered updates, and uses the multicast address of 224.0.0.10?

RIPv1
RIPv2
OSPF
EIGRP

A

EIGRP

33
Q

What is the difference between the interior and exterior routing protocols?

Exterior routing protocols are only used by large ISPs. Interior routing protocols are used by small ISPs
Interior routing protocols are used to route on the internet. Exterior routing protocols are used inside organizations.
Exterior routing protocols are used to administer a single autonomous system. Interior routing protocols are used to administer several domains.
Interior routing protocols are ised to communicate within a single

A

Exterior routing protocols are used to administer a single autonomous system. Interior routing protocols are used to administer several domains.
Interior routing protocols arenused to communicate within a single autonomous system. Exterior routing protocols are used to communicate between multiple autonomous systems.

34
Q

Which classless routing protocol supports VLSM and CIDR, supports manula route summarization, and uses the multicast address 224.0.0.9?

RIPv1
RIPv2
OSPF
EIGRP

A

RIPv2

35
Q

Which algorithm is used by the OSPF routing process to construct the SPF tree on a router?

DUAL algorithm
Bellman-Ford algorithm
Dijkstra’s algorithm
Path vector protocol

A

Dijkstra’s algorithm

36
Q

What are two characteristics of link-state protocols compared to distance vector protocols? (Choose two.)

They require a lot of hardware resources
They know of the network topology from the perspective of their neighbors.
They compute their own knowledge of the network topology.
They use hop counts to compute the network topology.
They flood the routing table to all hosts periodically.

A

They require a lot of hardware resources.

They compute their own knowledge of the network topology.

37
Q

What is an advantage of OSPF compared to RIP?

Fast convergence
Less complexity
Less CPU processing
Low memory requirements

A

Fast convergence