Standard IP access lists filter network traffic

Standard IP access lists filter network traffic


Access lists combined with dedicated ____ at the edge of your network provide the greatest security.

 

·         firewalls

 

Standard IP access lists filter network traffic based on ________ only.

 

·         source IP address

 

You want to create an access list that denies all outbound traffic to port 80 from the 10.10.0.0 network. Which access list entry meets your requirements?

 

·         access-list 101 deny tcp 10.10.0.0 0.0.255.255 any eq 80

 

Regarding access lists, which of the following statements is correct?

 

·         Only one access list per protocol, per direction, per interface

 

What extended IP access list syntax item is applied to determine which bits of the destination address are significant?

 

·         destination wildcard mask

 

You are using the access-class command to secure a vty line. In which configuration mode is the access-class command used?

 

·         Line Configuration mode

 

What are the number ranges for extended IP access lists?

 

·         100-199

 

In _______ configuration mode you add each line of the access list sequentially.

 

·         global

 

If you wish to remove an access list, you use the __________ command.

 

·         no access-list [list #]

 

Which command links an access list to the VTY lines?

 

·         access-class

 

You want to create an access list to filter all traffic from the 172.16.16.0 255.255.240.0 network. What wildcard mask is appropriate?

 

·         0.0.15.255

 

What are the number ranges for standard IP access lists?

 

·         1-99

 

Which command links an access list to the VTY lines?

 

·         access-class

 

Which command will configure a standard access list to only permit traffic from the network of 194.1.1.0?

 

·         Router(config)#access-list 99 permit 194.1.1.0 0.0.0.255

 

Which of the following access-list commands will allow packets from the 192.16.10.0 network?

 

·         Access-list 1 permit 192.16.10.0 0.0.0.255

 

You need to temporarily remove access-list 101 from one of your interfaces, which command is appropriate?

 

·         no ip access-group 101

 

Which of the following access-list commands allows only http traffic?

 

·         Access-list 101 permit tcp any any eq 80

 

How many access lists per protocol can an interface have?

 

·         2

 

Which of the following is accurate regarding the ordering of access lists?

 

·         Access lists are processed from top of the access list to the end.

 

What mode must the router be in to apply an access list to a router?

 

·         Interface configuration mode

 

After you create access lists you must apply them to ____ so they can begin filtering traffic.

 

·         interfaces

 

Given the following:

·        

access-list 111 deny tcp 200.1.1.0 0.0.0.255 any eq 80
access-list 111 permit ip any any
interface ethernet 0
ip access-group 111 out

Which of the following statements is true?

·         Telnet traffic coming in interface e0 will not be blocked.
FTP traffic in either direction is allowed to pass through interface e0.
Outbound http traffic on interface e0 will be filtered against an extended access-list.

 

What command is used to apply an inbound access list to an interface?

 

·         ip access-group 1 in

 

To view which interfaces have IP access lists set, use the show ________ command.

 

·         ip interface

 

You want to use access list 1 to filter traffic on your inbound vty lines. What command do you enter?

 

·         access-class 1 in

 

In an extended IP access list, what keyword is short for a wildcard mask of 0.0.0.0?

 

·         host

 

Which command syntax is used to apply an IP access list to an interface?

 

·         ip access-group 1 in

 

Which configuration mode must you be in to remove a standard IP access list from an interface?

 

·         Interface

 

A. Filter unwanted traffic before it travels onto a low-bandwidth link.
B. Place standard ACLs close to the destination IP address of the traffic.
C. Place extended ACLs close to the source IP address of the traffic.

Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)

·        
A. Filter unwanted traffic before it travels onto a low-bandwidth link.
B. Place standard ACLs close to the destination IP address of the traffic.
C. Place extended ACLs close to the source IP address of the traffic.
D. For every inbound ACL placed on an interface, there should be a matching outbound ACL.
E. Place extended ACLs close to the destination IP address of the traffic.
F. Place standard ACLs close to the source IP address of the traffic.

 

E. 8

 

·         If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?
A. 4
B. 16
C. 6
D. 12
E. 8

 

Answer Detail

Get This Answer

Invite Tutor