Networking - Security
Exercise : Security - Security
- Security - Security
16.
Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list?
- 172.16.30.55 0.0.0.255
- 172.16.30.55 0.0.0.0
- any 172.16.30.55
- host 172.16.30.55
- 0.0.0.0 172.16.30.55
- ip any 172.16.30.55
Answer: Option
Explanation:
The wildcard 0.0.0.0 tells the router to match all four octets. This wildcard format alone can be replaced with the host command.
17.
If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?
Answer: Option
Explanation:
Extended IP access lists use numbers 100-199 and 2000-2699 and filter based on source and destination IP address, protocol number, and port number. The last option is correct because of the second line that specifies permit ip any any. (I used 0.0.0.0 255.255.255.255, which is the same as the any option.) The third option does not have this, so it would deny access but not allow everything else.
18.
Which of the following series of commands will restrict Telnet access to the router?
Answer: Option
Explanation:
Telnet access to the router is restricted by using either a standard or extended IP access list inbound on the VTY lines of the router. The command access-class is used to apply the access list to the VTY lines.
19.
Which of the following commands connect access list 110 inbound to interface ethernet0?
Answer: Option
Explanation:
To place an access list on an interface, use the ip access-group command in interface configuration mode.
Quick links
Quantitative Aptitude
Verbal (English)
Reasoning
Programming
Interview
Placement Papers