You are on page 1of 2

Chapter 4

Consider the following access list.

access-list 100 permit ip host 192.168.10.1 any


access-list 100 deny icmp 192.168.10.0 0.0.0.255 any echo
access-list 100 permit ip any any

Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address
192.168.10.254 assigned? (Choose two.)
Correct Your
1Response Response
2 Devices on the 192.168.10.0/24 network can sucessfully ping devices on the 192.168.11.0 network.
Only Layer 3 connections are allowed to be made from the router to any other network device.
Only the network device assigned the IP address 192.168.10.1 is allowed to access the router.
A Telnet or SSH session is allowed from any device on the 192.168.10.0 into the router with this access list assigned.
Devices on the 192.168.10.0/24 network are not allowed to reply to any ping requests.

The first ACE allows the 192.168.10.1 device to do any TCP/IP-based transactions with any other destination. The second ACE stops
devices on the 192.168.10.0/24 network from issuing any pings to any other location. Everything else is permitted by the third ACE.
Therefore, a Telnet/SSH session or ping reply is allowed from a device on the 192.168.10.0/24 network.

Final Exam
Refer to the exhibit. A network administrator configures AAA authentication on router R1. The ACS servers are configured
and running. The administrator tests the configuration by telneting to R1. What will happen if the administrator attempts to
authenticate through the RADIUS server using incorrect credentials?

The enable secret password and a random username could be used in the next login attempt.

The authentication process stops.

The enable secret password could be used in the next login attempt.

The username and password of the local user database could be used in the next login attempt.

You might also like