Solution For ACL Question 100% Correct

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

Solution for ACL Question 100% Correct

http://img220.imageshack.us/i/acllabc.jpg/
A corporation wants to add security to its network. The requirements are:

 Host C shoulb be able to use a web browser(HTTP)to access the Finance Web Server
 Other types of access from host C to the Finance Web Server should be blocked.
 All acces from hosts in the Core or local LAN to the Finance We b Server should be
blocked
 All hosts in the Core and local LAN should be able to acces the Plublic Web Server.

You have been tasked to create and apply a numberd acces list to a single outbound
interface.

no more three statements that meets these requirements .

corp1(config)#access-list 100 permit tcp host (host address) host (finance web server address) eq 80

corp1(config)#access-list 100 deny ip any host (finance web server address)

Corp1(config)# access-list 100 permit ip any any

Corp1(config)#int fa0/1

Corp1(config-if)#ip access-group 100 out

Corp1(config-if)#end

Corp1#copy run start

Q.1 Which IPsec security protocol should be used when confidentiality is required?

A. PSK

B. AH

C. MD5

D. ESP< encapsulating security payload

Answer: D

Q.2
The command frame-relay map ip 10.121.16.8 102 broadcast was entered on

the router. Which of the following statements is true concerning this command?

A. This command should be executed from the global configuration mode.

B. The IP address 10.121.16.8 is the local router port used to forward data.

C. 102 is the remote DLCI that will receive the information.

D. This command is required for all Frame Relay configurations.

E. The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC.

Answer: E

Q.3 What are three features of the IPv6 protocol? (Choose three.)

A. checksums

B. optional IPsec

C. autoconfiguration

D. complicated header

E. plug-and-play

F. no broadcasts

ANS is C, E and F

Q.4 At which layer of the OSI model is RSTP used to prevent loops?

A. data link

B. network

C. physical

D. transport

Answer:: A
Q.5 Which device might be installed at a branch office to enable and manage an IPsec site-to-site
VPN?

A. Cisco IOS IPsec/SSL VPN client


B. Cisco VPN Clinet
C. ISDN terminal adapter
D. Cisco Adaptive Security Appliance

D???

Q.6 Which protocol is an open standard protocol framework that is commonly used in VPNs, to
provide secure end-to-end connections?

A. PPTP
B. IPsec
C. RSA
D. L2TP

Answer B ?>ok réponse: www.isaserver.com A, B, D ... se référer.

Q.7 Which statement is true, as relates to classful or classless routing?

A. Automatic summarization at classful boundries can cause problems on discontinuous subnets


B. EIGRP and OSPF are classful routing protocols and summarize routes by default
C. RIPv1 and OSPF are classless routing protocols
D. Classful routing protocols send the subnet mask in routing updates

Answer: A

Which three statements about RSTP are true?


/25 et crossover
Reponse 3

Question 11 as shown above.


what is the alternative notation for the IPV6 Address
B514:82C3:0000:0000:0029:EC7A:0000:EC72

a) B514:82C3:0029:EC7A:EC72
b) B514:82C3::0029:EC7A:EC72
c) B514:82C3:0029::EC7A:0000:EC72
d) 14:82C3::0029:EC7A:0:EC72

NONE OF THESE ARE RIGHT! Am I missing something?!


@Adeel Khan, how can your answer be right when the 2nd to last group of hex (0000) is
completely omitted and you can only use zero compression ONCE in an IPv6 address!

A correct answer would look like

B514:82C3::29:EC7A:0:EC72

if you used all available zero compression and leading zero rules. D is closest but somehow it
doesn’t show B5 in the first hex grouping. This cannot be an actual question.
Q.15 What value is primarily used to determine which port becomes the root port on each nonroot
switch in a spanning-tree topology?

A. port priority number and MAC address


B. lowest port MAC address
C. path cost
D. VTP revision number
E. highest port priority number

Answer: C
Q. 16 Two switches are connected through a tunk link. Which two commands show that there is a
native VLAN mismatch on that link? (Choose two)

A. show interfaces switchport


B. show interface trunk
C. show vlan brief
D. show interfaces vlan
E. show interfaces interface

A ET B
 1. which two data integrity algorithms are commonly used
in vpn solutions? 

Ans : HMAC-SHA-1 AND RSA 

2. which pariring reflects a correct protocol and metric
relationship? 
ans : ripv2 and number of hops 

3. a network admin needs to configure port security on a
switch..... 
ans : the network admin can configure static secure or sticky secure mac
addresses in the voice vlan 

the sticky learning feature allows the addition of dynamically learned addresses to
the running configuration 

4. the network technician is planning to use the
255.255.255.224 subnet mask on the.... 
ans: 
10.17.64.34 
10.16.33.98 
172.22.243.190 

5. statements A, B,C AND D of ACL 10 have been
entered... 
ans: CDBA 

 6. which three approaches can be used while migrating


from an ipv4 addressing scheme to an ipv6 scheme (3
ans) 
ans: 
use dhcpv6 to map ipv4 addresses to ipv6 addresses 
configure ipv4 tunnels between ipv6 islands 
enable dual-stack routing 

7. which three statements abot vtp .... 
ans: 
vtp pruning is used to increase available bandwidth in trunk links 
client, server and transparent are valid vtp modes 
each broadcast domain on a switch can have its own unique vtp domain. 





 8. which three elements must be used when you configure
a router interface for vlan truniking... 
ans: 
a management domain for each subinterface 
subinterface encapsulation identifiers that match vlan tags 
one ip network or subnetwork for each subinterface 
------------------------------------------------- 
9. which two statements describe the advanateges to the
use of rip over ospf? 
ans: 
rip is less complex to configure 
rip uses less bandwidth 
------------------------------------------------- 

10. what are three benefits of implementing vlans? 


ans: 
vlans make it eaiser for IT staff to configure.... 
a higher level of network sec..... 
broadcast storms can be mitigated by increasing....

11. assuming default seetings, how can you erase the vtp
database of vlans on..... 
ans: from privileged mode, erase the vlan.dat file, then reload 

12. which two states are the port states when rstp has
cconverged? 
ans: forwarding and learning 
13. what are two benefits of using NAT? 
ans: NAT eliminates the need to re-address..... 
NAT protects network security becuase private neworks are...... 
14. which two cisco ios commands, used in troubleshooting can
enable debug output to a remote location?? 
ans:show logging | redirect flash:output.txt 
snmp-server enable traps syslog 

15. which component of vpn technology ensures that data is


unaltered between the sender and recipient? 
ans:key exchnage 

16. which cisco ios diagnostics command can distrupt the


operation of a router under high load conditions? 
ans show processes cpu 
17. you are working in a data center......10.188.31.0/23.....  
ans: 10.188.31.0/27 

18. assuming the default switch configuration.... exteneded


vlan range (1006 to 4094) on switch 3750? 
ans: configure the switch to be in vtp transparent mode. 

19. which ciso ios command can help to dertermine the timing
of various debug events, relative to each other when you are
debugging a 
complicated router issue? 
ans: service timestamps log dateime msec 

20. a network admin receives an error message while trying to


configure the ethernet interface of a router with ip address  
10.24.24.24/29 which statment explains the reason for this
issue? 
ans: vlsm capable routing protocols must be enabled first on the router.

21. which parameters are used to calculate ospf cost in cisco


routers? 
ans: bandwidth, mtu, reliability, delay and load 

22. which three are characteristics of an ipv6 anycast address?  


ans: 
one-to-nearest communicaiton model 
the same address for multiple devices in the group 
delivery of packets to the group interface that is closest to the sending device

 
23. on which options are standard access lists based?  
ans: source address and wildcard mask 

24. which two statics appear in show frame relay map output 
ans: 
the ip address of the local router 
the value of the local dlci 

25. which encapsulation type is a frame relay encapsulation


type that is supported by cisco routers? 
ans : hdlc 

26. which ipv6 routing protocol uses multicast group ff02::9 to


send updates? 
ans: RIPng

28. which ipsec security protocol should be used when confidentiality is reqiured? 
ans: ESP

 
29. which protocol is an open standard protocol framework that
is commonly used in vpns to provide secure end to end
communications? 
ans: IPSEC 

30. when you are troubleshooting an acl issue on a router,


which command can help you to verify which interfaces are
affcted by the acl? 
ans: show ip access-lists 
31. what is the effect ofusing the service password encryption
command? 
ans: it will encrypt all current and future passwords. 

32. which command is necessary to permit ssh or telnet access


to a cisco swithc that is oterwise configured for these vty line
protocols? 
ans: transport input all 

33. refer to the exhibit. An attempt to deny web access to a subnet


blocks......ACL 102? 
ans: no ip access-group 102 in 

34. which layer 2 protocl encapsulation type supports synchronous


andasynchrounous circuits and has built in security mechanisms?  
ans: ppp 

35. when using the cli which banner displays a message upon every
connection that is made into the router?  
Ans: MOTD 

36. which statment is true, as relates to classful or classless routing? 


ans: classful routing protocols send the subnet mask in routing updates. 
37. which two statements about using the CHAP authentication
mechanism in a ppp....? 
ans: CHAP uses a two-way handshape 
CHAP authentication is performed only upon link establishment.

 
38. which three statements accurately describe layer 2 ethernet switches?
(3 ans) 
ans: 
a. Microsegmentation decreases the number of collisions on the network 
b. switches that are configured with VLANs make forwarding decisions based on both
layer and layer 3... 
c. In a properly functioning network with reduandant switched paths, each switched
segment will contain onre...forwarding state. All other switches in that broadcast domain
will have only one root port.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy