A router can have access list per protocol
When making changes,
you must remove the access list, using the ____ command.
·
no access-list [list
number]
To view the access
lists defined on your router, use the ____ command.
·
show access-lists
To view which
interfaces have IP access lists set, use the ____ command
·
show ip interface
Use the ____ command
to remove the application of the list
·
no ip access-group
[list #][direction]
To apply the inbound
access list 1 to an interface, you use the following command: ____.
·
ip access-group 1 in
The following command
sets an outbound access list filter: ____.
·
ip access-group 1 out
You must use the ____
command to save the list after configuration if you want it to survive a router
reload.
·
copy run start
Routers use ____ to
determine which bits in an address will be significant.
·
wildcard masks
It is possible to
replace the 0.0.0.0 255.255.255.255 entry, which represents all hosts and all
networks, with the ____ keyword.
·
any
Smart network
engineers pay close attention to network traffic flow and security when they
design and manage their networks.
·
true
With careful planning,
you can create access lists that control which traffic crosses particular
links, and which segments of your network will have access to others.
·
true
Access lists can take the
place of more advanced security measures, such as firewalls
·
False
Access lists begin
working the second they are applied to an interface
·
true
You can remove
individual lines in an access list.
·
False
Which wildcard mask
apply an access list line to all packets from network 172.25.0.0
·
0.0.255.255
Standard IP access
list filter traffic based on which of the following?
·
source IP address
Which command show
only the IP access list on a router
·
show ip access-lists
Which commands allows
you to view the interfaces that have IP access lists applied to them?
·
Show ip access-lists
Which host and
wildcard mask pair does any keyword represent?
·
255.255.255.255
Which command is used
to apply an IP access list to an interface?
·
ip access-group [list
#] [in|out]
Access lists are____?
·
used to filter traffic
control network security
b. applied as either inbound or outbound filters
C. sequential permit or deny statements
Standard IP access
lists are represented by the______ number range.
·
1-99
Which command could be
used to remove an access list from your router?
·
no access-lists 1
Extended IP access
lists are represented by the_____ number range.
·
100-199
the show
"access-lists" command displays _____
·
all access lists on
the router
At which of the
following prompts would you create an access lists?
·
routerC (config)#
At which of the
following prompts would you apply an access list to an interface?
·
routerC(config-if)#
Which of the following
host and corresponding wildcard masks pairs represent the same value as host
172.29.2.2?
·
192.29.2.2 0.0.0.0
A router can have
access list per protocol, per direction on each interface.
·
True
Which of the following
is benefit of using named lists?
·
You are not
constrained by the 100 lists per filter type limit.
What happens if a list
applied to an interface and then list itself is removed?
·
The Commands will be
executed and all traffic will be permitted.
What is true host
keyword?
·
It can be used with
standard and extended IP lists.
B. It replaces the 0.0.0.0 wildcard mask.
C. It is placed before the IP address with which it is associated.
What is the purpose of
the "established" parameter?
·
to prevent an traffic
into a network that did not originate from the network
All access lists
presented in this chapter, except standard IP lists, should be placed where?
·
as close to the source
as possible
Which command links an
access list to VTY lines?
·
access-class
Which SDM wizard
allows you to configure a DMZ?
·
Advanced firewall
wizard
The SDM cannot be used
to create complex access control lists.
·
False