Cisco Systems 2 manual Answer D

Page 73

640 - 607

Q. 113

Which statement should you use to deny FTP access only from Network 210.93.105.0 to Network 223.8.151.0?

A.Access-list one deny 210.93.105.0.0.0.0.0.0 any eq ftp access-list one permit any.

B.Access-list 100 deny tcp 210.93.105.0 0.0.0.255 223.8.151.0 0.0.0.255 eq ftp

C.Access-list 100 deny ip 223.8.151.0 0.0.0.255 any eq ftp Access-list 100 permit ip any any

D.Access-list 100 deny tcp 210.93.105.0 0.0.0.255 223.8.151.0 0.0.0.255 eq ftp Access-list 100 permit ip any any

Answer: D

Explanation: Great care must be taken whenever an access list is configure as there is an assumption of deny all when they do not match the access list. The proper command for configuring an extended access to deny ftp traffic is: access-list 100 deny tcp source address destination address eq FTP. When configured this way the access list will deny ftp traffic and permit all other.

Incorrect Answers:

A is incorrect; the entire statement has syntax problems. You use a number, not a word (one) for the access list, and the access list for this problem needs to be an extended address list in the range of 100-199.

B is incorrect; this access list will deny access, but then any non-match falls through and will be denied.

C is incorrect; this access list denies access from 223.8.151.0 to anywhere else – this is not what the problem asked. 223.8.151.0 is supposed to be the destination, not the source.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 318-320.

Q. 114

Which network mask should you place on a class C address to accommodate a user requirement of two sub networks with a maximum of 35 hosts on each network?

A.255.255.255.192

B.255.255.255.224

C.255.255.255.240

D.255.255.255.248

Answer: A

Explanation: For the networks, we need 2 bits. We must really accommodate for networks, because when we subnet the formula is 2**n –2. For 35 hosts, we need a minimum of 37 hosts for the same reason, 2**n –2. We round 37 up to the next power of 2, which is 64, and we need 6 bits for the host. We use 2+6=8 bits.

Leading the way in IT testing and certification tools, www.testking.com

- 73 -

Image 73
Contents Ccna Important Note Please Read Carefully Answer D Which command displays the configuration register setting?Incorrect Answers Answer D ExplanationAnswer B Explanation Answer C ExplanationExhibit Answer a Explanation Answer B Answer C During encapsulation in which order is information packaged?Answer E Explanation Answer A, B, E Answer F Explanation Answer a What is the result of segmenting a network with a bridge?Physical layer Data layer Network layer Transport layer Host 1-1 can ping Host Answer B, D, F Answer A, B and EAnswer A, B, D 640 Answer A, D, F Answer B, C, E Answer A, D Cable #1 Cable #2 Cable #3 Cable #4 Answer A, B 640 Answer D What is the likely cause of this problem? Answer A, C, D Answer Answer B, F 640 RIP Ospf Eigrp Igrp Answer Explanation Answer A, B, D, E Answer D Is incorrect this is not a valid command Answer B Answer D Answer A, C, D, E Answer E Which of the following are true?What is a benefit of a virtual LAN VLAN? Answer C, D Answer B Given the configuration example Answer D, E Explanation Answer A, E, F Answer D, F Which two statements about IP RIP are true? Choose twoHow does inter-VLAN communication take place? Answer A, B, C, and D CSMA/CD Answer A, D Which two statements about a bridge are true. Choose two Which statement about an IP network is true? Answer A, B, C, G 10.0.0.0 to 172.16.0.0 to 192.168.0.0 toExplanation Which statement is true? Incorrect Options Answer A, B, D ExplanationAnswer A, C, E Which two protocol tools use ICMP? Choose two Answer a and BAnswer A, C Which command successfully ping an individual IP address?One Two None Several Which commands should you use to enable Igrp routing? Answer E Answer A, B, C Explanation Answer A, B, C Answer B, DWhat is the bandwidth capacity of an Isdn B channel? Answer a Which statement about Ethernet networks is true? What is the distance limitation for 100BaseT? Which command sets the clock rate to 56 Kbps on serial0? Setup dialogue what do the square bracket indicate? Which command retrieves the configuration file from NVRAM? What is the most common Layer 2 device? SAP Hdlc ARP Novellether Answer a Answer D Answer A, C What are two components of an IPX address? Answer B, C Explanation Answer C, D, E, F Answer F Answer a and d Which two statements are true? Choose twoWhat is a backoff on an 802.3 network? What is a key use of a device hardware address? 16,382 65,534 Session Network Transport Maintenance 640 Answer A, C Explanation What are the characteristics of UDP? MAC LLC SAP LCP Tab Ctrl R Spacebar Right Arrow PPP Lapd Isdn Hdlc Which two commands show your access lists? Choose two What does the command show access-list 101 list?Answer B, C IP and IPX IP and PPP PPP and Sdlc PPP and Hdlc 640 What are two functions of Icmp protocol? Choose Two Answer C, D, E ExplanationAnswer D, E 172.37.2.55 to What does the term ‘Base’ refer to in 100BaseT? Click the task button & Place the encapsulation Answer Explanation IP-Space enable From where does the router boot? When you issue the command show version, your router returns101 What is the most common mail to device? 103 104 105 106 Which statement about Ethernet switches is true? 108 109 110 111 Answer A, B, F 113 Which operation is most likely to follow? You just entered the following command115 Answer A, B, C, D What is back off on an 802.3 network? 118 Answer B, E Which command displays access list 111?120 121 122 123 124 125 126 Answer E, F, G 128 Answer A, D Explanation 130 What are the generic parts of a network layer address? What is an advantage of local area network LAN segmentation?132 133 134 135 136 How does a bridge function? 138 What are two purposes for using switches? Choose two What is an example of a valid MAC address? 141 Answers C, D Which two physical interfaces does PPP support? Choose two143 144 145 146 147 148 149 What is the purpose of ISL and 802.lq frame tagging? 151 152 Which of the following describes isdn bri servie? 154 Answer B What do you use for loop avoidance? Choose two 156 Answer B Diagram 158 Answer A, B, E Identify the effect of Ctrl-Z? 160 161 162 163 Answer a How do you change the Console password to cisco? 165 166 167 Answer C 301 Answer D Q299Answer C 303 Answer D 302Answer a 304 Answer B, C 307 Answer B 310 Answer D 309 What is the purpose of DLCIs in Frame Relay?172 173 Answer C 318 175 176 177 178 179 180 Q327 Answer Unknown 328 Answer Unknown
Related manuals
Manual 40 pages 55.56 Kb Manual 100 pages 60.16 Kb