This action might not be possible to undo. Are you sure you want to continue?
Switch: Switches operate at Layer 2 Data Link Layer Address Learning Forward / Filter decision using MAC address Loop Avoidance Breakup collision domains Switches create separate collision domains but a single broadcast domain Hub: Hub operates at Layer 1 Physical Layer No Filtering No Addressing Hub creates single collision domain and single broadcast domain Make forwarding to all the ports when signal is arrived 2. What is PING utility? PING – Packet Internet Gopher A utility that verifies connections to one or more remote hosts. The ping command uses the ICMP echo request and echo reply packets to determine whether a particular IP system on a network is functional. Ping is useful for diagnosing IP network or router failures. 3. What is a VLAN? What does VLAN provide? VLAN – Virtual Local Area Network Vlan is a logical grouping or segmenting a network connected to administratively defined ports on a switch, they provide Broadcast control, Security and Flexibility.
4. What is Subnetting? Why is it used? Used in IP Networks to break up larger networks into smaller subnetworks. It is used to reduce network traffic, Optimized network performance, and simplify management i.e. to identify and isolate network problems. 5. Difference between the Communication and Transmission? Communication is the process of sending and receiving data by means of a data cable that is connected externally. Transmission means the transfer of data from the source to the destination. 6. What is RAID? A method used to standardize and categorize fault-tolerant disk systems. RAID levels provide various mixes of performance, reliability, and cost. Some servers provide three of the RAID levels: Level 0 (striping), Level 1 (mirroring), and Level 5 (striping & parity). 7. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs? 10Base2 an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 200 meters (185mts). Known as Thinnet. 10Base5 an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 500 meters. Known as Thicknet. 10BaseT an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses two pairs of twisted-pair baseband signaling, with a contiguous cable segment length of 100 meters. 8. What are the two types of Transmission Technology available? Point – to – Point and Broadcast 9. What is point-to-point protocol? An industry standard suite of protocols for the use of point-to-point links to transport multiprotocol datagrams. 10. What are the possible ways of data exchange?
What is Protocol Data Unit? The processes at each layer of the OSI model. Layers Transport Network Data Link Physical PDU Segments Packets/Datagrams Frames Bits 13. allowing multiple signals to be sent simultaneously. What are major types of Networks and explain? Peer-to-Peer Network Computers can act as both servers sharing resources and as clients using the resources. 15. Server-based Network Provide centralized control of network resources and rely on server computers to provide security and network administration 14. What is Mesh Network? . In broadband transmission. What is difference between Baseband and Broadband Transmission? In a baseband transmission. signals are sent on multiple frequencies.Simplex Half-duplex Full-duplex 11. What is Passive Topology? When the computers on the network simply listen and receive the signal. the entire bandwidth of the cable is consumed by a single signal. 12. they are referred to as passive because they don’t amplify the signal in any way.
What is Terminal Emulation. in which layer it comes? The use of software. 20. switched Data Link Layer encapsulation that services multiple virtual circuits and protocols between connected mechanism. in which layer it comes? Frame relay is an industry standard. What is Brouter? It’s a Hybrid device that combines the features of both bridges and routers. What are NetBIOS and NetBEUI? NetBIOS – Network Basic Input / Output System . 18. How Gateway is different from Routers? Gateway A device connected to multiple physical TCP/IP networks capable of routing or delivering IP packets between them. installed on PC or LAN server. 21.A network in which there are multiple network links between computers to provide multiple paths for data to travel. What is Subnet? A subdivision of an IP network. Router It’s a layer 3 device that connects 2 different networks and routes packets of data from one network to another. 17. It belongs to application layer. What is Beaconing? An FDDI frame or Token Ring frame that points to serious problem with the ring. 22. 19. Telnet is also called as terminal emulation. that allows the PC to function as if it were dumb terminal directly attached to a particular type of mainframe. What is Frame relay. The beacon frame carries the address of the station thought to be down. Frame relay is a packet-switched technology. It breaks up Broadcast domain as well as Collision Domain. 16. such as a broken cable. shared access.
It is usually used in small. typically caused by distance. What is MAC address? The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture.An application-programming interface (API) that can be used by programs on a local area network (LAN). What is Cladding? A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable. a network protocol native to Microsoft Networking. We can use the ping command to send ICMP echo request messages and record the receipt of ICMP echo reply messages. MAC address is usually stored in ROM on the network adapter card and is unique. conduct sessions. 23. What is ICMP? ICMP – Internet Control Message Protocol It is a Network Layer Internet protocol. 26. department-size local area networks (LANs) of 1 to 200 clients. and send datagrams between nodes on a network. 28. RARP – Reverse Address Resolution Protocol The protocol within the TCP/IP stack that maps MAC addresses to IP addresses. What is the difference between TFTP and FTP application layer protocols? . NetBIOS provides programs with a uniform set of commands for requesting the lower-level services required to manage names. With these messages. What is Attenuation? In communication weakening or loss of signal energy. NetBEUI – NetBIOS Extended User Interface An improved version of the NetBIOS protocol. 25. 27. What is difference between ARP and RARP? ARP – Address Resolution Protocol The protocol that traces IP addresses to MAC addresses. 24. we can detect network or host communication failures and troubleshoot common TCP/IP connectivity problems. It can use Token Ring source routing as its only method of routing. which can report errors and status information.
as defined by the IEEE 802 standard. 29. This sublayer is responsible for error detection but not correction. What is Virtual Channel? A logical circuit that is created by Virtual channel links. easy to use and fast. 33. What is logical link control? One of two sublayers of the data link layer of OSI reference model. local networks and cannot be used with a router. What is the difference between routable and non. between any two points on the network. there can be no more than five network segments or four repeaters.routable protocols? Routable protocols can work with a router and can be used to build large networks. NonRoutable protocols are designed to work on small. and of those five segments only three of segments can be populated. a group of virtual circuits can be grouped together into what is called path. manipulating directories. 30.TFTP – Trivial File Transfer Protocol A stripped down version of FTP. Explain 5-4-3 rule? In a Ethernet network. FTP allows access to both Directories and files. The other name for Virtual Channel is Virtual Circuit. 34. TFTP has no Directory browsing. 32. flow control and framing. . FTP – File Transfer Protocol The TCP/IP protocol used for transmitting files between network nodes. It carries data between two endpoints in a network. What is Virtual Path? Along any transmission path from a given source to a given destination. no Authentication and insecure it can only send and receive files. typing file contents and copying files between hosts. What MAU? MAU – Multistation Access Unit 31.
. 43. RIP. What is Autonomous System? A group of Networks under mutual administration that share the same routing methodology. What is Gateway-to-Gateway protocol? It is a protocol formerly used to exchange routing information between Internet core routers. 38. 37. and its routing algorithm is called multicast routing. 41. E. IGRP and OSPF. What is IGP (Interior Gateway Protocol)? Any protocol used by an internetwork to exchange routing data within an autonomous system.g. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files. 39. Autonomous Systems are subdivided by Areas and must be assigned an individual 16-bit number by the IANA. It’s a Classless Routing Protocol meaning when updates are sent they send both IP address and Subnet mask. 40.35. What is BGP (Border Gateway Protocol)? It is a protocol used to advertise the set of networks that can be reached within an autonomous system. This is newer than EGP (Exterior Gateway Protocol). What is Packet Filter? 36. What is Kerberos? An authentication mechanism used to verify user or host identity. What is EGP (Exterior Gateway Protocol)? It is the protocol the routers in neighboring autonomous systems use to identify the set of networks that can be reached within or via each autonomous system. What is OSPF (Open Shortest Path First)? OSPF is the first Open Standard Link State Routing Protocol. What is multicast routing? Sending a message to a group multicast address is called multicasting. 42. BGP enables this information to be shared with the autonomous system.
e. Route updates sent within the routers will be secured with the help of MD5 encrypted password. 224. Router ID If the priority is set 1 to all the routers then there is a tie in priority.e. Metric used is Cost i.e. The Router that connects more than one Area is called as Area Border Routers. The Router that connects to other Autonomous system is called as Autonomous System Boundary Router.5 – SPF (all OSPF routers) 224. This router will be then called as Designated Router and the router with less value of IP address after Designated Router will be called as Backup Designated Router.0.0. Cost= ————— Bandwidth OSPF uses algorithm to build Routing Table called Dijisktra. It’s called as Backbone Area.e. In OSPF Routers can be connected in two methods i.0.Administrative Distance is 110.6 – Designated router and Backup Designated router OSPF maintains 3 types of Routing table i. in this case it will check if there is any loopback address is given to any router if not the router with highest value of IP address will be elected as Router ID. There should be atleast one area by name Area 0. Routing updates are sent as Multicast addresses i. Topology Table (SPF) and Neighborship Table. Point-to-Point Link Point to Multipoint Link In OSPF a single large Autonomous system is break into small areas. Routing Table (Dijisktra).0. 108 . Sends only Incremental and Triggered updates.
In OSPF routing updates are called as Link State Advertisements. Link State Advertisements to other routerRB it will send that update to Topology Database of routerRB and will run an algorithm SPF on routerRB to create a new Topology Table. Point-to-Point Link Halo Interval – 10 Dead Interval – 40 Adjacency Built If both router interfaces belongs to same Area. Password. Hello Interval.0. TCP/IP. Point to Multipoint Link Halo Interval – 30 Dead Interval – 120 .0.If a Router has all interfaces existing in single area than that router is called as Internal Router. Hello Packets Received It contains Area Id. Uptime. Dead Interval.e. Whenever a router send routing updates to DR and BDR it uses Destination address as 224. same Password then Hallo and Dead Intervals should be set same. After that Dijisktra Algorithm is run to find the best path and that entry will be put in Routing Table.6 and when DR send updates to all the routers it uses Destination address as 224. If an OSPF router wants to send updates to other OSPF router then it should carry 3 requirements i.5. The router when sends Hallo packets to other router a Neighborship Table is set on that Router. Neighborship Table and Router Id.0. When one routerRA sends updates i. What is SLIP (Serial Line Internet Protocol)? An industry standard serial encapsulation for point-to-point connections that supports only a single routed protocol.0. 44. Neighborship Built If both routers are adjacent to each other then Neighborship is built in Routers.e.
same metric. What is the HELLO protocol used for? The HELLO protocol uses time instead of distance to determine optimal routing. Metric used is Hop counts (number of routers to cross to reach the destination). Rip uses algorithm name Bellman Ford Algorithm to determine the best path selection. Administrative Distance is 120. It offers a connectionless datagram service that guarantees neither delivery nor correct sequencing of delivered packets (much like IP).45. What protocol do DNS name servers use? DNS uses UDP for communication between servers. It is an alternative to the Routing Information Protocol. . What is RIP (Routing Information Protocol)? Rip run on any Routers hence called as Open Standard Distance Vector Routing Protocol. 48. RIP Timers Route update timer – 30seconds Route invalid timer – 180 seconds Holddown timer – 180 seconds Route flush timer – 240 seconds 46. Supports 6 paths if there is a tie in metric i. Supports maximum 15 Hops.e. whereas exterior gateways connect the organization to the outside world. It’s a classful routing protocol meaning when updates are sent they send only IP address but not subnet mask. What are the advantages and disadvantages of the three types of routing tables? 47. What is the difference between interior and exterior neighbor gateways? Interior gateways connect LANs of one organization. 49.
they are all Physical layer devices. Resource records are maintained as ASCII files. such as IP. A Network layer address is a logical address assigned by the network administrator to identify a device running a Network layer protocol. How do Data Link layer addresses and Network addresses differ? Give a description of each. all the devices attached to the hub receive that signal. other differences do exist. hubs. Because of the reduction of the size of the segment. What is anonymous FTP and why would you use it? Anonymous FTP enables users to connect to a host without using a valid login and password. There are several types of resource records used. 55. What are the differences or similarities. A hub and a concentrator are the same thing. Describe. 52. Anonymous FTP is used to enable a large number of users to access files. BOOTP helps a diskless workstation boot. collisions and overall traffic also are reduced. Hubs are repeaters with 8–24 ports. and thereby increases performance. Besides the names suggesting that addresses reside at different layers. the reasons for implementing LAN segmentation. How does it get a message to the network looking for its ip address? A protocol used primarily on TCP/IP networks to configure diskless workstations. and concentrators? First. Data Link layer addresses are assigned by the manufacturer and identify the actual hardware device. if any. 54. A repeater can connect two network segments. Segmentation also cuts down on the traffic generated by broadcasts and multicasts. What is a DNS resource record? A resource record is an entry in a name server’s database. with hub being the more common term used today. Repeaters regenerate and amplify the signal traveling on the wire to extend the normal distance limitation of the signal. When one machine attached to the hub sends anything over the network. in general terms. anonymous FTP uses a login called anonymous or guest. . including name-to-address resolution information.50. It confines user traffic to a segment and addresses and solves distance limitation problems. between repeaters. BOOTP sends a UDP message with a subnetwork broadcast address and waits for a reply from a server that gives it the IP address. 51. Usually. with the password usually requesting the user’s ID for tracking purposes only. 53.
whereas routers must process all the logical address information in the route tables. What are some of the advantages to using bridging and switching instead of routing? Increased overhead and latency Reduced overhead and latency Broadcast propagation Lower equipment costs Answer A is incorrect because it is a negative aspect of routing as compared to switching. such as Ethernet and Token-Ring? A bridge or a switch A concentrator or a hub A router A gateway Answer A is incorrect because bridges and switches can’t perform protocol translation. Answer B is correct because bridges and switches look only at Data Link layer information. Which of the three switching methods is fastest. Answer C is incorrect because switches do not have this effect. What would be the best network segmentation device if you wanted to connect two dissimilar networks. . and why? Cut-Through switching is the fastest method because the switches read only the first six bytes of the frame before forwarding it. Answer B is incorrect because neither a concentrator nor a hub can segment a network. Answer D is incorrect because switches are now very sophisticated and can cost as much as routers. among other things. not a segmentation device. 58. 59. What services do bridges and switches provide? Bridges and switches can determine whether a frame is destined for the local network segment or needs to be forwarded to another network segment based on the destination MAC address. 57. Answer D is incorrect because a gateway functions as a translator. Answer C is correct because routers can provide translation between dissimilar protocols.56.
which slows processing. They query NetBIOS cache for the appropriate paths. . 61. routers. Answers C and D are incorrect because they are simply not accurate. Answer A is correct because routing decisions are made based on the contents of routing tables. How do routers make routing decisions? They build tables and make their decisions based on those tables. 62. Answers A. bridges. hubs.60. Answer B is incorrect because routers are incapable of making decisions without tables already in place. Answer B is correct because the router must examine and consider the frame header detail before passing it. Routers must translate the signal. Answer A is correct because resolving those addresses is more time consuming. They use hello packets to discover routes on the fly.) Routers must work at layer 3. and concentrators comprise the only combination that resides at the Physical layer. and concentrators Repeaters. and bridges Repeaters. Why is overhead or latency associated with routers? (Choose all that apply. but then the signal can cut through directly. Routers must examine the frame header before passing it. which is inherently slower. Which of the following represents Physical layer devices? Repeaters. Answer C is incorrect because hello packets are used to calculate routes when new routers are added to a network. and D are combinations of devices that reside at different layers. C. routers. hubs. and concentrators Repeaters. and switches Answer B is correct because repeaters. They perform lookups and make their decisions dynamically with discovery. Answer D is incorrect because it is simply inaccurate. Routers must hold a frame for a given period of time for security purposes.
Answer B is incorrect because there is no such thing as a broadcast of multicast traffic. Answer C is correct because VLANs extend the flexibility of LANs by enabling the port-by-port isolation of users and assignment to distinct VLANs if desired. 65. Which two characteristics describe Store and Forward switching? The entire frame is copied into the buffer.63. They’re more flexible because they enable device assignment only on a port-byport basis. Concentrators and switches Routers and bridges Bridges and switches Bridges and hubs Answer A is incorrect because concentrators reside at the Physical layer and switches at the Data Link layer. What is an advantage of having a VLAN (Virtual LAN)? Traffic control between VLANs is processor intensive. Choose the devices that are used for Data Link layer segmentation. Broadcasts of multicast traffic are contained within one VLAN. It provides higher throughput. Answer B is incorrect because routers are level 3 devices and bridges are level 2 devices. the words broadcast and multicast are mutually exclusive. . The frame is forwarded based on the first six bytes. Answer D is incorrect because bridges reside at the Data Link layer and hubs at the Physical layer. 64. Answer C is correct because bridges and switches reside at the Data Link layer. users are not inherently isolated by group. Answer A is incorrect because there is nothing more or less processor intensive about VLANs. It provides error checking. Answer D is incorrect because VLANs by their definition segment workgroups. With VLANs.
At what layer of the OSI model do VLANs operate? VLANs operate at layer 2 of the OSI model. 66. such as Fast Ethernet (ISL). VTP switches operate in one of three modes: server. 67. 70. Answers A and D are incorrect because they describe Store and Forward switching. Name the Cisco proprietary protocol used on Fast Ethernet VLAN trunk links. which provides higher throughput. The frame is forwarded based on the first six bytes. 68. or transparent. . what does your router require? You need a router that has some kind of viable trunking connection. Answers B and C are correct because Cut-Through switching provides forwarding based on what is contained in the first six bytes of the frame. To allow Inter-VLAN communication. It provides higher throughput. Name the three VTP modes in which a switch can operate. ISL (Inter-Switch Link) protocol is used to encapsulate VLAN traffic over Fast Ethernet trunk links.Answers A and D are correct because Store and Forward switching copies the entire frame into the buffer before forwarding. Answers B and C are incorrect because they describe CutThrough. 69. Name the Cisco proprietary protocol that allows VLANs to be managed within domains. VTP (VLAN Trunking Protocol) allows multiple VLANs to be managed within a single VTP domain. and must be configured with subinterfaces. Which two characteristics describe Cut-Through switching? The entire frame is copied into the buffer. which also provides for error checking. 71. It provides error checking. client.
VLANs control broadcasts. Answer D is incorrect because a firewall is meant to shelter internal networks from intrusion from the outside. VLANs provide increased network security. 74. Answers C and D are simply incorrect. VLANs incorporate only one router per routed subnet. VLANs ease security restrictions. Answers B and E are correct because VLAN implementation controls broadcasts and provides isolation. Answer A is incorrect because routers are not at all necessary for a VLAN to operate. 73. Choose two benefits of VLAN implementation. Choose one method of decreasing broadcasts across a switched network. Answer C is correct because each VLAN becomes its own broadcast domain. Answers A and B are incorrect because they are simply false. What is the purpose of a trunking protocol? To connect the backbone of a primary VLAN to the backbone of a secondary VLAN For one switch fabric to be integrated with another switch fabric For a VLAN on one switch to be linked to a VLAN on another switch To enable multiple trunking protocols to communicate Answers A is incorrect because it uses wrong terminology. Set up an Intra-LAN. Set up a workgroup banded by a server cluster.72. Answer B is incorrect because switch fabric is a hardware-related component of a switch and belongs . VLANs amplify broadcasts. Set up a VLAN to isolate traffic. therefore security. Set up a firewall to isolate traffic.
Choose the encapsulation protocol used on Fast Ethernet links. and D is incorrect because no such links exist. At which layer of the OSI model does ISL function? Data Link layer Network layer Physical layer LLC Data Link sublayer Answer A is correct because ISL functions at the Data Link layer of the OSI model. Cisco Switch Link Dedicated Switch Link Inter-Switch Link VLAN Switch Link Answer C is correct because Inter-Switch Link protocol is the encapsulation protocol used on Fast Ethernet links. Answers B and C are incorrect because ISL does not function at those layers of the OSI model. B. Answer C is correct because trunking protocols allow management of VLANs with similar or dissimilar trunking protocols. 75. Answers A.to one switch only. 77. 76. Which method is used by VTP to convey VLAN configuration information within its management domain? Through directed broadcasts Through LSA’s local service advertisements Through multicast advertisements Through port flooding . Answer D is incorrect because the specific sublayer does not have any distinction in this context. Answer D is incorrect because a trunking protocol does not enable multiple trunking protocols to communicate.
Answer D is incorrect because it is simply false. Answer B is correct because VTP is designed to enable an administrator to manage VLANs running dissimilar trunking protocols. It enables an administrator to manage VLANs across dissimilar trunking protocols. In ATM LANE. It enables an administrator to merge the management duties of more than two trunk links together. what factor determines the type of trunking protocol used? The link type The encapsulation mode The density of VLANs The ATM LANE Module type Answer A is correct because the link type determines the type of trunking protocol used. Communication is limited to VLANs off the same switch backplane. Answer D is incorrect because the ATM LANE Module is a hardware card and does not affect trunking protocols. Answer C is incorrect because a trunk link does not necessary entail management duties on its own. 78. 79. Answers B and C are incorrect because they are simply false. . What is VTP designed to do? It enables an administrator to manage VLANs across multiple trunk links. It is used to synchronize VTP advertisements across multiple trunk links. Answer A is incorrect because trunk links do not address the aspect of communication. and D is incorrect because they do not convey information within management domains. Answers A. 80. Communication is limited to devices within the same VLAN. What is a limitation of Intra-VLAN traffic? Communication is limited to VLANs directly connected to a router.Answer C is correct because multicast advertisement convey configuration information to all connected switches in the same management domain. B.
to maintain access lists Answer A is correct because VTP operates at layer 2 and maintains VLAN configuration consistency. answers B and C are incorrect because the second portion of the answers is incorrect. The second step is to apply the list to an interface by using the [protocol type] access-group command followed by the access list number and parameters. Answer C is correct because that is the very definition of Intra-VLAN traffic. Answer D is incorrect because VLANs cannot talk to each other without a router. Although the OSI layer is correct. What two basic steps are necessary to create access list filters? The first step is to build the list at global configuration mode using the access-list command followed by an access list number signifying the type. 83. to maintain domain synchronization Layer 3. IP standard access list = 1–99 IP extended access list = 100–199 IPX standard access list = 800–899 IPX extended access list = 900–999 IPX SAP filter = 1000–1099 84. What is the purpose of a wildcard mask? . and it is a hardware component. Answer A is incorrect because VLANs are connected for Inter-VLAN communication. VTP (Virtual Trunking Protocol) exists at which layer and for what purpose? Layer 2. 81. 82. to maintain trunking protocol synchronization Layer 2. Answer B is incorrect because the backplane is where traffic is actually switched. to maintain VLAN configuration consistency Layer 2. Identify the appropriate access list range values used to create access lists. Answer D is incorrect because VTP and switching do not operate at layer 3 and access lists are maintained on routers.Communication is limited to devices between VLANs.
0 .255.0.0 255.10.To enable an administrator to apply an access list rule to a group of hosts or subnets by masking off bits within an IP address. any = 0. Answers A.0) 86.0. Which of the following represents the default wildcard mask value? 0.255 host = specific IP address of an end host (192. 87.255 255. How does the direction in which an access list is applied affect datagram processing? Access lists applied to an interface in an inbound direction determine whether a datagram received on an interface will be forwarded or blocked. making the bit positions within the mask variable.255.0.16. 88.255.255. Access lists applied to an interface in an outbound direction determine whether a datagram already received will be forwarded out that interface.0. What is the access list number range used to identify an IP standard access list? 0–100 1–100 1–99 1–10 101–199 Answer C is correct because the correct value range to identify an IP standard access list is 1–99. D.255.0 255. Name the access list keywords.255.255 0.0. B.255.0. and E are incorrect because they are not ranges used to identify an IP standard access list.0.2 0. 85.
Answer C is incorrect because it does not specify the protocol after the permit statement and also is using the host keyword with the destination network. Answers B.255.255 host 155. the protocol type is IP not ICMP. which is not used for wildcard masking.0? Access-list 12 permit IP 166.0.0 Access-list 120 permit ICMP 166.255 155.255.10. 90.0 0.10.155 155.0 0. Answer B is incorrect because it uses an incorrect inverse mask for the destination network.10.0.0. Which of the following commands creates a standard IP extended access list that enables ping echo requests to be sent from any host on network 166.10.Answer A is correct because.0. C.255 host 155. Write the command to view all access lists created on your router regardless of protocol. Answers B and C are incorrect because neither are the default mask.0.255 eq echo Access-list 120 permit 184.108.40.206.0.10. the default mask used is 0.10.) IP access-group 100 out IP access-list 100 out IP access-group 100 in IP access-group E0 out Answer A is correct because IP access-group 100 out is the command that would apply access list 100 to interface E0 in an outbound direction.10.0.0 to network 155.0.255 eq echo Answer A is incorrect because the access list number is not an extended list number. Answer D is correct because it uses a valid access list number and syntax to forward ICMP echo requests.0.0.0.0. Write the command that would apply access list 100 to interface E0 in an outbound direction.0.10. and D are simply incorrect. (Assume you are already at interface configuration mode of the Ethernet interface.0 Access-list 120 permit ICMP 166. Also.255. which is invalid.0.0.0.10. Answer D is incorrect because it is a regular mask.0.10.0 0. and the destination is specifying the host keyword but using a subnet value instead.255.0.0.0.0 0.0. 89. . if unspecified.255. 91.
2.255. Which of the following best describes the function of the following access list line? Access-list 87 permit 145. 220.127.116.11 155.0. It is an IP standard access list enabling host 18.104.22.168 0. Answer D is correct because it correctly describes the access list behavior.22.214.171.124 0. Answer B is incorrect because this is not an IPX standard list. 92. and D are incorrect because these commands do not enable you to perform that specific function.1 to access any host on subnet 155.0.0 to access hosts on network 126.96.36.199.255.1.0. Which of the following commands applies IPX SAP filter 1010 to an interface in the outbound direction? IPX access-group 1010 out IPX output-sap-filter 1010 IPX output sap-filter 1010 IPX-sap-filter 1010 out . It is an IPX standard access list allowing host 145. Answers A and C are incorrect because they do not state the actions of this access list correctly.0. which can access host 155. It is an extended IP access list allowing hosts on network 145.0.19. Answers B.188.8.131.52.0.0.255 Any host on subnet 155.1 to access any host on subnet 155.show access-lists show ip access-lists show ipx interfaces show ipx servers Answer A is correct because show access-lists enables you to view all access lists created on your router regardless of protocol. C.6.0 can access host 184.108.40.206.19.
2.0. 96.0. Answer B is correct because it uses the correct syntax.0.255 host 137.10.1 0.10. Answers B. Answer C is incorrect because it is missing the hyphen between the output and sap commands.255. Which two of the following commands will enable Telnet traffic from all hosts on network 166. Answer D is incorrect because it is a completely invalid command.0 0. Answers B.10. Write the command to bind IPX extended access list 901 to interface serial 0 on an inbound direction. eq 23 .255 137. 220.127.116.11 to be forwarded to the Telnet server 137.1? Access-list 110 permit TCP 166. C.1 eq Telnet Access-list 99 permit TCP 166.0.0. IPX access-group 901 in IPX access-group 901 S0 out IPX access-group 910 in IPX access-group 901 out Answer A is correct because IPX access-group 901 in is the command that will bind the IPX extended access list 901 to interface serial 0 on an inbound direction.0.10.0. 94. C.0.255. and D are incorrect because these commands do not enable that specific function. and D are incorrect because they are simply false. Which command can you use to display a list of access list filters configured on your router for IP only? show IP access-lists show access-lists show IPX interfaces show IPX servers Answer A is correct because show IP access-lists enables you to display a list of access list filters configured on your router for IP only.10.10.Answer A is incorrect because it is the syntax used to define a standard or extended list.0 0.
0 0.10.0 eq 23 Access-list 110 permit IP 166.10. which is used for standard lists.10.0.255.0.0.0.0.255 137.255 137.1 0.0. Answer B is incorrect because the access list number is 99.10.Access-list 110 permit TCP 166. .1 0. eq 23 Answers A and C are correct.2.0.2. Answer D is incorrect because it uses IP instead of TCP after the permit statement.0.0 0.255. The only difference between the two is that Answer A uses the host keyword and the Telnet keyword instead of a port number.0.
This action might not be possible to undo. Are you sure you want to continue?