IP Access Control List Flashcards
Given the following URI https://courses.examsdigest.com/ccna, which part is the hostname?
(A) https
(B) courses
(C) courses.examsdigest.com
(D) examsdigest.com
(E) examsdigest.com/ccna
Given the following URI https://courses.examsdigest.com/ccna, which part is the hostname?
(A) https
(B) courses
**(C) courses.examsdigest.com **
(D) examsdigest.com
(E) examsdigest.com/ccna
Which of the following protocols uses the port 443?
(A) HTTPS
(B) HTTP
(C) SMTP
(D) SSH
Which of the following protocols uses the port 443?
**(A) HTTPS **
(B) HTTP
(C) SMTP
(D) SSH
Which of the following protocols uses the port 80?
(A) HTTPS
(B) HTTP
(C) SMTP
(D) SSH
Which of the following protocols uses the port 80?
(A) HTTPS
(B) HTTP
(C) SMTP
(D) SSH
Which of the following protocols uses the port 25?
(A) HTTPS
(B) HTTP
(C) SMTP
(D) SSH
Which of the following protocols uses the port 25?
(A) HTTPS
(B) HTTP
(C) SMTP
(D) SSH
Which of the following protocols uses the port 22?
(A) HTTPS
(B) HTTP
(C) SMTP
(D) SSH
Which of the following protocols uses the port 22?
(A) HTTPS
(B) HTTP
(C) SMTP
(D) SSH
Which of the following port numbers the SNMP protocol uses?
(A) 20
(B) 25
(C) 160
(D) 161
Which of the following port numbers the SNMP protocol uses?
(A) 20
(B) 25
(C) 160
(D) 161
Which of the following port numbers the POP3
protocol uses?
(A) 100
(B) 110
(C) 120
(D) 130
Which of the following port numbers the POP3
protocol uses?
(A) 100
**(B) 110 **
(C) 120
(D) 130
Which of the following port numbers the DNS protocol uses?
(A) 50
(B) 51
(C) 52
(D) 53
Which of the following port numbers the DNS protocol uses?
(A) 50
(B) 51
(C) 52
(D) 53
The senior network engineer assigns you a task that requires ACL configuration. He provides the following diagram and the requirements below:
1. Enable the ACL inbound on R2’s G0/1 interface.
2. Permit packets coming from the host with IP 20.2.2.1 3. Deny packets coming from the rest subnet 20.2.2.0/24 4. Permit packets coming from a network with subnet 155.165.0.0/16
Now you are responsible to configure the R2 using the ACL standard number 1.
Which of the following commands will you type to complete the task?
(A) R2# configure terminal
R2(config)# access-list 1 permit 20.2.2.1
R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255 R2(config)# interface G0/2
R2(config-if)# ip access-group 1 in
(B) R2# configure terminal
R2(config)# access-list 1 permit 20.2.2.1
R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255
R2(config)# interface G0/1
R2(config-if)# ip access-group 1 in
(C) R2# configure terminal
R2(config)# access-list 1 permit 20.2.2.1
R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255 R2(config)# interface G0/1
(D) R2# configure terminal
R2(config)# access-list 1 deny 20.2.2.1
R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255 R2(config)# interface G0/1
R2(config-if)# ip access-group 1 in
The senior network engineer assigns you a task that requires ACL configuration. He provides the following diagram and the requirements below:
1. Enable the ACL inbound on R2’s G0/1 interface.
2. Permit packets coming from the host with IP 20.2.2.1 3. Deny packets coming from the rest subnet 20.2.2.0/24 4. Permit packets coming from a network with subnet 155.165.0.0/16
Now you are responsible to configure the R2 using the ACL standard number 1.
Which of the following commands will you type to complete the task?
(A) R2# configure terminal
R2(config)# access-list 1 permit 20.2.2.1
R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255 R2(config)# interface G0/2
R2(config-if)# ip access-group 1 in
**(B) R2# configure terminal
R2(config)# access-list 1 permit 20.2.2.1
R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255
R2(config)# interface G0/1
R2(config-if)# ip access-group 1 in **
(C) R2# configure terminal
R2(config)# access-list 1 permit 20.2.2.1
R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255 R2(config)# interface G0/1
(D) R2# configure terminal
R2(config)# access-list 1 deny 20.2.2.1
R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255 R2(config)# interface G0/1
R2(config-if)# ip access-group 1 in
Which of the following options are things that a standard IP ACL could be configured to do? (Choose two answers.)
(A) Match the exact source IP address
(B) Match all IP addresses in a subnet with one access-list command without matching other IP addresses
(C) Match IP addresses 20.2.2.2 through 20.2.2.22 with one access-list command without matching other IP addresses
(D) Match only the packet’s destination IP address
Which of the following options are things that a standard IP ACL could be configured to do? (Choose two answers.)
(A) Match the exact source IP address
**(B) Match all IP addresses in a subnet with one access-list command without matching other IP addresses **
(C) Match IP addresses 20.2.2.2 through 20.2.2.22 with one access-list command without matching other IP addresses
(D) Match only the packet’s destination IP address
One of the differences between named and numbered ACLs is that named ACLS using ACL subcommands, not global commands, to define the action and matching parameters.
(A) TRUE
(B) FALSE
One of the differences between named and numbered ACLs is that named ACLS using ACL subcommands, not global commands, to define the action and matching parameters.
(A) TRUE
(B) FALSE
Given the following fields, which of those cannot be compared on an extended IP ACL?
(A) Application protocol
(B) Destination IP address
(C) Source IP address
(D) URL
(E) TOS Byte
Given the following fields, which of those cannot be compared on an extended IP ACL?
(A) Application protocol
(B) Destination IP address
(C) Source IP address
(D) URL
(E) TOS Byte
Your task is to type a one-line standard ACL that matches the following criteria.
All access-list commands use the number 1 in the command.
Criteria #1: Permit packets from 186.33.2.3
ACL command #1: ______________________
(A) access-list 1 permit 186.33.2.3
(B) access-list 1 deny 186.33.2.3
(C) access-list 1 permit 186.33.2.0
(D) access-list 1 deny 186.33.0.0
Your task is to type a one-line standard ACL that matches the following criteria.
All access-list commands use the number 1 in the command.
Criteria #1: Permit packets from 186.33.2.3
ACL command #1: ______________________
(A) access-list 1 permit 186.33.2.3
(B) access-list 1 deny 186.33.2.3
(C) access-list 1 permit 186.33.2.0
(D) access-list 1 deny 186.33.0.0
Your task is to type a one-line standard ACL that matches the following criteria. All access-list commands use the number 1 in the command.
Criteria #2: Permit packets from hosts with 56.57.2 as the first three octets
ACL command #2: ______________________
(A) access-list 1 permit 56.57.2.0 0.0.0.255
(B) access-list 1 permit 57.57.2.0 0.0.0.255
(C) access-list 1 permit 56.57.2.0 0.0.255.255
(D) access-list 1 deny 56.57.2.0 0.0.0.255
Your task is to type a one-line standard ACL that matches the following criteria. All access-list commands use the number 1 in the command.
Criteria #2: Permit packets from hosts with 56.57.2 as the first three octets
ACL command #2: ______________________
(A) access-list 1 permit 56.57.2.0 0.0.0.255
(B) access-list 1 permit 57.57.2.0 0.0.0.255
(C) access-list 1 permit 56.57.2.0 0.0.255.255
(D) access-list 1 deny 56.57.2.0 0.0.0.255
Your task is to type a one-line standard ACL that matches the following criteria. All access-list commands use the number 1 in the command.
Criteria #3: Permit packets from hosts with 56.57 as the first two octets
ACL command #3: ______________________
(A) access-list 1 permit 56.57.0.0 0.255.255.255
(B) access-list 1 permit 56.57.0.0 0.0.255.255
C) access-list 1 permit 56.58.0.0 0.0.255.255
(D) access-list 1 permit 56.57.0.0 0.0.0.0
Your task is to type a one-line standard ACL that matches the following criteria. All access-list commands use the number 1 in the command.
Criteria #3: Permit packets from hosts with 56.57 as the first two octets
ACL command #3: ______________________
(A) access-list 1 permit 56.57.0.0 0.255.255.255
(B) access-list 1 permit 56.57.0.0 0.0.255.255
C) access-list 1 permit 56.58.0.0 0.0.255.255
(D) access-list 1 permit 56.57.0.0 0.0.0.0