Preview

Ccna Studies

Good Essays
Open Document
Open Document
1147 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ccna Studies
Question 1
Your boss is learning a CCNA training course, refer to the exhibit. The access list has been configured on the S0/0 interface of router RTB in the outbound direction. Which two packets, if routed to the interface, will be denied? (Choose two)

access-list 101 deny tcp 192.168.15.32 0.0.0.15 any eq telnet access-list 101 permit ip any any
A. source ip address: 192.168.15.5; destination port: 21 not telnet port
B. source ip address: 192.168.15.37 destination port: 21 not telnet port
C. source ip address: 192.168.15.41 destination port: 21 not telnet port
D. source ip address: 192.168.15.36 destination port: 23 satisfies telnet port, in correct range of addresses to satisfy access-list
E. source ip address: 192.168.15.46; destination port: 23 satisfies telnet port, in correct range of addresses to satisfy access-list
F. source ip address: 192.168.15.49 destination port: 23 satisfies telnet port, not in range of addresses Answer: D E
Explanation
First we notice that telnet uses port 23 so only D, E & F can satisfy this requirement.
The purpose of this access-list is to deny traffic from network 192.168.15.32 255.255.255.240 (to find out the subnet mask just convert all bit “0″ to “1″ and all bit “1″ to “0″ of the wildcard mask) to telnet to any device. So we need to figure out the range of this network to learn which ip address will be denied. Subnet mask is /28, so 4 bits borrowed.
128 64 32 16 8 4 2 1
0
16
32 33-46 47 is broadcast
48
Increment: 16
Network address: 192.168.15.32
Broadcast address: 192.168.15.47
-> Only 192.168.15.36 (Answer D) & 192.168.15.46 (Answer E) belong to this range so they are the correct answer.
Question 2
Refer to the graphic. It has been decided that PC1 should be denied access to Server. Which of the following commands are required to prevent only PC1 from accessing Server1 while allowing all other traffic to flow normally? (Choose two)

A – Router(config)# interface fa0/0

You May Also Find These Documents Helpful

  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 8 Lab 8

    • 1017 Words
    • 8 Pages

    2. Using Subnet Mask addressing expands the capabilities while holding rules because of the wide variety of numbers that can be assigned. Not just IP address matters, now the Subnet Mask plays a part as well.…

    • 1017 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Most of the network equipment and the operating systems will be configured with this. Because of the security concerns of using Telnet protocols over an open network like the Internet, means that its use have waned significantly in favour of Secure…

    • 623 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    NT1210Uni5Lab5

    • 1370 Words
    • 4 Pages

    The IP Adrress 10.162.108.48, the subnet 255.255.252.0, and the gateway or router 10.162.110.1 address. This comes from step2 above.…

    • 1370 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    6. A starting address of 192.0.0.0 and ending address of 223.255.255.255 is a member of which network class? Class C…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Comp230 Week 1 Lab Report

    • 941 Words
    • 4 Pages

    Subnet Mask . . . . . . . . . . . : 255.255.0.0…

    • 941 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    COMP 230 WK 1 7 QUIZ

    • 2401 Words
    • 33 Pages

    (TCO 1) Which one of the following Windows NET commands will allow other computers to access the C:\Data directory under the share nameUserData?…

    • 2401 Words
    • 33 Pages
    Satisfactory Essays
  • Powerful Essays

    Ch09 Solutions

    • 1016 Words
    • 5 Pages

    9. In Figure 15-9, the subnet mask is four notches tall and is considered a classless subnet…

    • 1016 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Router Simulation

    • 331 Words
    • 2 Pages

    9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    This network access control determines which IP packets are allowed entry to a network and which are dropped.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    7. Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms?…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Final Exam Review

    • 726 Words
    • 3 Pages

    Truth Table 0 AND 0 = False (0) / 1 AND 0 False (0) / 1 AND 1 True (1)…

    • 726 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    lab week 1

    • 419 Words
    • 3 Pages

    Question: What is the significance of the “S*” next to the 0.0.0.0 network entry? Explain the differences between the entry in Router3’s route table and the 0.0.0.0 entry in Router2’s table. (3 points)…

    • 419 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Net Sec

    • 11860 Words
    • 48 Pages

    5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24?…

    • 11860 Words
    • 48 Pages
    Powerful Essays

Related Topics