Module 4 Flashcards

1
Q

What does ACL mean?

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A series of IOS commands that are used to filter packets based on information found in the packet header

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An ACL uses a sequential list of permit or deny statements, known as ____

A

access control entries (ACEs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACEs are also commonly called ____

A

ACL statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ controls access to a network by analyzing the incoming and/or outgoing packets and forwarding them or discarding them based on given criteria

A

Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two types of ACLs

A

Standard and Extended ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type of ACL, which only filters at Layer 3 using the source IPv4 address only.

A

Standard ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type of ACL that filters at Layer 3 using the source and/or destination IPv4 address. They can also filter at Layer 4 using TCP, UDP ports, and optional protocol type information for finer control.

A

Extended ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An ____ ACL filters packets before they are routed to the outbound interface.

A

inbound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ____ is similar to a subnet mask in that it uses the ANDing process to identify which bits in an IPv4 address to match

A

wildcard mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This keyword substitutes for the 0.0.0.0 mask. This mask states that all IPv4 address bits must match to filter just one host address.

A

host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This keyword substitutes for the 255.255.255.255 mask. This mask says to ignore the entire IPv4 address or to accept any addresses

A

any

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ ACLs are the preferred method to use when configuring ACLs

A

Named

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ ACLs should be located as close as possible to the source of the traffic to be filtered

A

Extended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ ACLs should be located as close to the destination as possible

A

Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly