Security(Networking ) Questions and Answers
Explanation:-
Answer: Option C. -> One access list may be configured, per direction, for each layer 3 protocol configured on an interface.A Cisco router has rules regarding the placement of access lists on a router interface. You can place one access list per direction for each layer 3 protocol configured on an interface.
Question 3. You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?
Explanation:-
Answer: Option D. -> show ip interface Ethernet 0The only command that shows which access lists have been applied to an interface is show ip interface Ethernet 0. The command show access-lists displays all configured access lists, and show ip access-lists displays all configured IP access lists, but neither command indicates whether the displayed access lists have been applied to an interface.
Explanation:-
Answer: Option C. -> access-list 10 deny 192.168.160.0 0.0.31.255The range of 192.168.160.0 to 192.168.191.0 is a block size of 32. The network address is 192.168.160.0 and the mask would be 255.255.224.0, which for an access list must be a wildcard format of 0.0.31.255. The 31 is used for a block size of 32. The wildcard is always one less than the block size.
Explanation:-
Answer: Option B. -> access-list 1 deny 172.16.10.1 0.0.0.0Standard IP access lists use the numbers 1-99 and 1300-1999 and filter based on source IP address only. Option C is incorrect because the mask must be in wildcard format.
Explanation:-
Answer: Option D. -> No IP traffic will be allowed out E0.If you add an access list to an interface and you do not have at least one permit statement, then you will effectively shut down the interface because of the implicit deny any at the end of every list.
Explanation:-
Answer: Option C. -> Router# show access-listsThe show access-lists command will allow you to view the entire contents of all access lists, but it will not show you the interfaces to which the access lists are applied.
Explanation:-
Answer: Option A. -> access-list 10 deny 172.16.192.0 0.0.31.255First, you must know that a /19 is 255.255.224.0, which is a block size of 32 in the third octet. Counting by 32, this makes our subnet 192 in the third octet, and the wildcard for the third octet would be 31 since the wildcard is always one less than the block size.
Explanation:-
Answer: Option C. -> access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23The extended access list ranges are 100-199 and 2000-2699, so the access-list number of 100 is valid. Telnet uses TCP, so the protocol TCP is valid. Now you just need to look for the source and destination address. Only the third option has the correct sequence of parameters. Answer B may work, but the question specifically states "only" to network 192.168.10.0, and the wildcard in answer B is too broad.
Explanation:-
Answer: Option A. -> access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq wwwThe first thing to check in a question like this is the access-list number. Right away, you can see that the second option is wrong because it is using a standard IP access-list number. The second thing to check is the protocol. If you are filtering by upper-layer protocol, then you must be using either UDP or TCP; this eliminates the fourth option. The third and last answers have the wrong syntax.