Ccna 3 Chapter 8 V4.0 Answers

Only available on StudyMode
  • Download(s) : 350
  • Published : November 2, 2012
Open Document
Text Preview
1.Refer to the exhibit. A network administrator needs to add the command deny ip 10.0.0.0 0.255.255.255 any log to R3. After adding the command, the administrator verifies the change using the show access - list command. What sequence number does the new entry have?

0

10, and all other items are shifted down to the next sequence number
50

60 *****

2.Refer to the exhibit. What happens if the network administrator issues the commands shown when an ACL called Managers already exists on the router?
The new commands overwrite the current Managers ACL.

The new commands are added to the end of the current Managers ACL. *****

The new commands are added to the beginning of the current Managers ACL.
An error appears stating that the ACL already exists.

3
Why are inbound ACLs more ef
ficient for the router than outbound ACLs?

Inbound ACLs deny packets before routing lookups are required. *****
Inbound ACL operation requires less network bandwidth than outbound.
Inbound ACLs permit or deny packets to LANs, which are typically more effic ient
than WANs.

Inbound ACLs are applied to Ethernet interfaces, while outbound ACLs are applied to slower serial interfaces.

4

Refer to the exhibit. The network administrator of a company needs to configure the router RTA to allow its business partner
(Partner A) to access the web server located
in the internal network. The web server is assigned a private IP address, and a static NAT is configured on the router for its public IP address. Finally, the administrator adds the ACL. However, Partner A is de

nied access to the web server. What is the
cause of the problem?

Port 80 should be specified in the ACL. *****

The public IP address of the server, 209.165.201.5, should be specified as the destination.

The ACL should be applied on the s0/0 outbound interf
ace.

The source address should be specified as 198.133.219.0 255.255.255.0 in the ACL.

5

ACL logging generates what type of syslog message?

unstable network

warning

informational *****

critical situation

6

Which two host addresses are included in the
range specified by 172.16.31.64
0.0.0.31? (Choose two.)

172.16.31.64

172.16.31.77 ****

172.16.31.78 ****

172.16.31.95

172.16.31.96

7

Traffic from the 64.104.48.0 to 64.104.63.255 range must be denied access to the network. What wildcard mask would the n
etwork administrator configure in the
access list to cover this range?

0.0.15.255 *****

0.0.47.255

0.0.63.255

255.255.240.0

8

ACLs are used primarily to filter traffic. What are two additional uses of ACLs? (Choose two.)

specifying source addresses for
authentication

specifying internal hosts for NAT ****

identifying traffic for QoS ****

reorganizing traffic into VLANs

filtering VTP packets

9

What can an administrator do to ensure that ICMP DoS attacks from the outside are mitigated as much as possibl
e, without hampering connectivity tests initiated from the
inside out?

Create an access list permitting only echo reply and destination unreachable packets

from the outside. ****

Create an access list denying all ICMP traffic coming from the outside.
Permi
t ICMP traffic from only known external sources.

Create an access list with the established keyword at the end of the line.

10

What effect does the command reload in 30 have when entered into a router?
If a router process freezes, the router reloads aut
omatically.

If a packet from a denied source attempts to enter an interface where an ACL is applied, the router reloads in 30 minutes.

If a remote connection lasts for longer than 30 minutes, the router forces the remote user off.

A router automatically re
loads in 30 minutes. *****

11

Refer to the exhibit. The following commands...
tracking img