Documents

CCNA Guide to Networking - Ch10 - Quiz Solutions

Categories
Published
of 6
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Description
CCNA Guide to Networking - Ch10
Transcript
  CCNA Guide to Cisco Networking, Fourth EditionChapter 10 Solutions Chapter 10 Solutions Review Questions 1.Which wildcard mask would appl an access list line to all packets !rom network 1 #.$#.0.0%a.$##.$##.$##.0 &.$##.$##.0.0c.$##.$#'.0.0d.0.0.$##.$##$.Standard () access lists !ilter tra!!ic &ased on which o! the !ollowing% *Choose all that appl.+a.destination () address &.() protocolc.port num&er d.source () address.Wildcard masks use a ----0----- to signi! which &its o! an address are signi!icant.'.Which command shows onl the () access lists on a router%a.show accesslists &.show ip/ accesslistsc.show ip accesslistsd.show inter!ace#.Which commands allow ou to iew the inter!aces that hae () access lists applied to them% *Choose all that appl.+a.show inter!aces &.show ip inter!acec.show ip tra!!icd.show ip counters.Which host and wildcard mask pair does the an keword represent%a.$##.$##.$##.$##0.0.0.0 &.0.0.$##.$##0.0.0.0c.0.0.0.0 0.0.0.0d.0.0.0.0$##.$##.$##.$## .Which command is used to appl an () access list to an inter!ace%a.ip accessgroup 2list 34 2in5out4 &.ip accessgroup permit 100c.ip accessgroup 2list 34 2permit5den4d.show ip inter!ace6.Access lists are ---------. *Choose all that appl.+a.used to !ilter tra!!ic and control network securit &.applied as either in&ound or out&ound !iltersc.se7uential permit or den statementsd.&uilt into the router8s !irmware9.Standard () access lists are represented & the --------- num&er range.a.100:199 1  CCNA Guide to Cisco Networking, Fourth EditionChapter 10 Solutions &.1:99c.1000:1099d.$00:$9910.Which command could &e used to remoe an access list !rom our router%a.no ip accessgroup in &.no ip accesslist 1 inc.no accesslist 1d.no ip accesslist one11.E/tended () access lists are represented & the --------- num&er range.a.100:199 &.$00:$99c.1000:1099d.1:991$.;he show accesslists command displas ---------.a.access lists applied to inter!aces &.all access lists on the router c.onl () access lists on the router d.onl ()< access lists on the router 1.At which o! the !ollowing prompts would ou create an access list%a.routerC3 &.routerC=c.routerC*con!igi!+3d.routerC*con!ig+31'.At which o! the !ollowing prompts would ou appl an access list to an inter!ace%a.routerC3 &.routerC=c.routerC*con!igi!+3d.routerC*con!ig+1#.Which o! the !ollowing host and corresponding wildcard mask pairs represent the same alue as host 1 $.$9.$.$%a.0.0.0.0$##.$##.$##.$## &.1 $.$9.$.$ 0.0.0.0c.$##.$##.$##.$## 0.0.0.0d.0.0.0.01 $.$9.$.$1.A router can hae one access list per protocol, per direction on each inter!ace. ;rue or False%1 .Which o! the !ollowing is a &ene!it o! using named lists%a.;he snta/ is identical to using num&ered lists. &.Fewer lists are allowed, so it is easier to remem&er them.c.>ou are not constrained & the 100 lists per !ilter tpe limit.d.?sing named lists o!!ers no &ene!its.16.What happens i! a list is applied to an inter!ace and then the list itsel! is remoed%a.;he commands will &e e/ecuted and all tra!!ic will &e denied. &.;he commands will &e e/ecuted and all tra!!ic will &e permitted. $  CCNA Guide to Cisco Networking, Fourth EditionChapter 10 Solutionsc.;he commands will not &e e/ecuted and all tra!!ic will &e permitted.d.None o! the a&oe19.What is true o! the host keword% *Choose all that appl.+a.(t can onl &e used with e/tended () lists. &.(t can &e used with standard and e/tended () lists.c.(t replaces the 0.0.0.$## wildcard mask.d.(t replaces the 0.0.0.0 wildcard mask.e.(t is placed &e!ore the () address with which it is associated.!.(t is placed a!ter the () address with which it is associated.$0.What is the purpose o! the @esta&lished parameter%a.to esta&lish a connection &etween the sender and receier  &.to preent an tra!!ic into a network c.to preent an tra!!ic into a network that didn8t originate !rom that network d.to permit all ;C) tra!!ic &ut not () tra!!ic into the esta&lished network $1.All access lists presented in this chapter, e/cept standard () lists, should &e placed where%a.as close to the source as possi&le &.as close to the destination as possi&lec.as close to the serial inter!ace as possi&led.as close to the t!tp serer as possi&le$$.Which command links an access list to the B;> lines%a.ip accessgroup &.ip accessclassc.t accessclassd.accessclass$. Which SD wiard allows ou to con!igure a D%a. Firewall con!iguration wiard &. Securit con!iguration wiardc. asic Firewall Wiardd. Adanced Firewall Wiard$'. Hist the three asic Firewall Wiard securit settings.Iigh SecuritDedium SecuritHow Securit$#. ;he SD cannot &e used to create comple/ access control lists. ;rue or False%   CCNA Guide to Cisco Networking, Fourth EditionChapter 10 Solutions Case Projects Case Project 1 Hisa8s proposed list will &lock all tra!!ic !rom the 1 0.##.0.0 network. Since it is a standard ACH, it cannot proide the leel o! control ou need to meet the case proJect re7uirements. ;he correct wa to accomplish the task is with an e/tended ACH such as the !ollowingK access-list 100 deny tcp 170.55.0.0 0.0.255.255 host 164.106.105.3 eq wwwaccess-list 100 permit ip any any ;his access list should &e placed on the router that is as close to the we& serer as  possi&le. Case Project 2 Himiting access to B;> lines ia ACHs is a simple process. First, ou hae to create the  proper ACH and then appl it to the B;> line with the accessclass command. (n order to limit B;> access to a single workstation, ou !irst create the appropriate ACH.(n the case stud, ou must limit access to Just the 1 .1..1L$' host. ;he commands to  per!orm this task are as !ollowsKaccesslist 1 permit host 1 .1..1>ou must then appl the ACH to the B;> lineK access-class 1 in (n order to allow access onl !rom the 1 .1..0L$' su&net, ou must use the !ollowing commandsK access-list 1 permit 173.13.6.0 0.0.0.255access-class 1 in '
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks