A router can have access list per protocol

A router can have access list per protocol


When making changes, you must remove the access list, using the ____ command.

 

·        no access-list [list number]

 

To view the access lists defined on your router, use the ____ command.

 

·        show access-lists

 

To view which interfaces have IP access lists set, use the ____ command

 

·        show ip interface

 

Use the ____ command to remove the application of the list

 

·        no ip access-group [list #][direction]

 

To apply the inbound access list 1 to an interface, you use the following command: ____.

 

·        ip access-group 1 in

 

The following command sets an outbound access list filter: ____.

 

·        ip access-group 1 out

 

You must use the ____ command to save the list after configuration if you want it to survive a router reload.

 

·        copy run start

 

Routers use ____ to determine which bits in an address will be significant.

 

·        wildcard masks

 

It is possible to replace the 0.0.0.0 255.255.255.255 entry, which represents all hosts and all networks, with the ____ keyword.

 

·        any

 

Smart network engineers pay close attention to network traffic flow and security when they design and manage their networks.

 

·        true

 

With careful planning, you can create access lists that control which traffic crosses particular links, and which segments of your network will have access to others.

 

·        true

 

Access lists can take the place of more advanced security measures, such as firewalls

 

·        False

 

Access lists begin working the second they are applied to an interface

 

·        true

 

You can remove individual lines in an access list.

 

·        False

 

Which wildcard mask apply an access list line to all packets from network 172.25.0.0

 

·        0.0.255.255

 

Standard IP access list filter traffic based on which of the following?

 

·        source IP address

 

Which command show only the IP access list on a router

 

·        show ip access-lists

 

Which commands allows you to view the interfaces that have IP access lists applied to them?

 

·        Show ip access-lists

 

Which host and wildcard mask pair does any keyword represent?

 

·        255.255.255.255

 

Which command is used to apply an IP access list to an interface?

 

·        ip access-group [list #] [in|out]

 

Access lists are____?

 

·        used to filter traffic control network security
b. applied as either inbound or outbound filters
C. sequential permit or deny statements

 

Standard IP access lists are represented by the______ number range.

 

·        1-99

 

Which command could be used to remove an access list from your router?

 

·        no access-lists 1

 

Extended IP access lists are represented by the_____ number range.

 

·        100-199

 

the show "access-lists" command displays _____

 

·        all access lists on the router

 

At which of the following prompts would you create an access lists?

 

·        routerC (config)#

 

At which of the following prompts would you apply an access list to an interface?

 

·        routerC(config-if)#

 

Which of the following host and corresponding wildcard masks pairs represent the same value as host 172.29.2.2?

 

·        192.29.2.2 0.0.0.0

 

A router can have access list per protocol, per direction on each interface.

 

·        True

 

Which of the following is benefit of using named lists?

 

·        You are not constrained by the 100 lists per filter type limit.

 

What happens if a list applied to an interface and then list itself is removed?

 

·        The Commands will be executed and all traffic will be permitted.

 

What is true host keyword?

 

·        It can be used with standard and extended IP lists.
B. It replaces the 0.0.0.0 wildcard mask.
C. It is placed before the IP address with which it is associated.

 

What is the purpose of the "established" parameter?

 

·        to prevent an traffic into a network that did not originate from the network

 

All access lists presented in this chapter, except standard IP lists, should be placed where?

 

·        as close to the source as possible

 

Which command links an access list to VTY lines?

 

·        access-class

 

Which SDM wizard allows you to configure a DMZ?

 

·        Advanced firewall wizard

 

The SDM cannot be used to create complex access control lists.

 

·        False

 

 

Answer Detail

Get This Answer

Invite Tutor