Solution For ACL Question 100% Correct
Solution For ACL Question 100% Correct
Solution For ACL Question 100% Correct
http://img220.imageshack.us/i/acllabc.jpg/
A corporation wants to add security to its network. The requirements are:
Host C shoulb be able to use a web browser(HTTP)to access the Finance Web Server
Other types of access from host C to the Finance Web Server should be blocked.
All acces from hosts in the Core or local LAN to the Finance We b Server should be
blocked
All hosts in the Core and local LAN should be able to acces the Plublic Web Server.
You have been tasked to create and apply a numberd acces list to a single outbound
interface.
corp1(config)#access-list 100 permit tcp host (host address) host (finance web server address) eq 80
Corp1(config)#int fa0/1
Corp1(config-if)#end
Q.1 Which IPsec security protocol should be used when confidentiality is required?
A. PSK
B. AH
C. MD5
Answer: D
Q.2
The command frame-relay map ip 10.121.16.8 102 broadcast was entered on
the router. Which of the following statements is true concerning this command?
B. The IP address 10.121.16.8 is the local router port used to forward data.
E. The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC.
Answer: E
Q.3 What are three features of the IPv6 protocol? (Choose three.)
A. checksums
B. optional IPsec
C. autoconfiguration
D. complicated header
E. plug-and-play
F. no broadcasts
ANS is C, E and F
Q.4 At which layer of the OSI model is RSTP used to prevent loops?
A. data link
B. network
C. physical
D. transport
Answer:: A
Q.5 Which device might be installed at a branch office to enable and manage an IPsec site-to-site
VPN?
D???
Q.6 Which protocol is an open standard protocol framework that is commonly used in VPNs, to
provide secure end-to-end connections?
A. PPTP
B. IPsec
C. RSA
D. L2TP
Answer: A
a) B514:82C3:0029:EC7A:EC72
b) B514:82C3::0029:EC7A:EC72
c) B514:82C3:0029::EC7A:0000:EC72
d) 14:82C3::0029:EC7A:0:EC72
B514:82C3::29:EC7A:0:EC72
if you used all available zero compression and leading zero rules. D is closest but somehow it
doesn’t show B5 in the first hex grouping. This cannot be an actual question.
Q.15 What value is primarily used to determine which port becomes the root port on each nonroot
switch in a spanning-tree topology?
Answer: C
Q. 16 Two switches are connected through a tunk link. Which two commands show that there is a
native VLAN mismatch on that link? (Choose two)
A ET B
1. which two data integrity algorithms are commonly used
in vpn solutions?
Ans : HMAC-SHA-1 AND RSA
2. which pariring reflects a correct protocol and metric
relationship?
ans : ripv2 and number of hops
3. a network admin needs to configure port security on a
switch.....
ans : the network admin can configure static secure or sticky secure mac
addresses in the voice vlan
the sticky learning feature allows the addition of dynamically learned addresses to
the running configuration
4. the network technician is planning to use the
255.255.255.224 subnet mask on the....
ans:
10.17.64.34
10.16.33.98
172.22.243.190
5. statements A, B,C AND D of ACL 10 have been
entered...
ans: CDBA
8. which three elements must be used when you configure
a router interface for vlan truniking...
ans:
a management domain for each subinterface
subinterface encapsulation identifiers that match vlan tags
one ip network or subnetwork for each subinterface
-------------------------------------------------
9. which two statements describe the advanateges to the
use of rip over ospf?
ans:
rip is less complex to configure
rip uses less bandwidth
-------------------------------------------------
11. assuming default seetings, how can you erase the vtp
database of vlans on.....
ans: from privileged mode, erase the vlan.dat file, then reload
12. which two states are the port states when rstp has
cconverged?
ans: forwarding and learning
13. what are two benefits of using NAT?
ans: NAT eliminates the need to re-address.....
NAT protects network security becuase private neworks are......
14. which two cisco ios commands, used in troubleshooting can
enable debug output to a remote location??
ans:show logging | redirect flash:output.txt
snmp-server enable traps syslog
19. which ciso ios command can help to dertermine the timing
of various debug events, relative to each other when you are
debugging a
complicated router issue?
ans: service timestamps log dateime msec
23. on which options are standard access lists based?
ans: source address and wildcard mask
24. which two statics appear in show frame relay map output
ans:
the ip address of the local router
the value of the local dlci
28. which ipsec security protocol should be used when confidentiality is reqiured?
ans: ESP
29. which protocol is an open standard protocol framework that
is commonly used in vpns to provide secure end to end
communications?
ans: IPSEC
35. when using the cli which banner displays a message upon every
connection that is made into the router?
Ans: MOTD
38. which three statements accurately describe layer 2 ethernet switches?
(3 ans)
ans:
a. Microsegmentation decreases the number of collisions on the network
b. switches that are configured with VLANs make forwarding decisions based on both
layer and layer 3...
c. In a properly functioning network with reduandant switched paths, each switched
segment will contain onre...forwarding state. All other switches in that broadcast domain
will have only one root port.