Preview

Cisco

Good Essays
Open Document
Open Document
1516 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cisco
Solution for ACL Question 100% Correct

http://img220.imageshack.us/i/acllabc.jpg/

A corporation wants to add security to its network. The requirements are: y y y y Host C shoulb be able to use a web browser(HTTP)to access the Finance Web Server Other types of access from host C to the Finance Web Server should be blocked. All acces from hosts in the Core or local LAN to the Finance We b Server should be blocked All hosts in the Core and local LAN should be able to acces the Plublic Web Server.

You have been tasked to create and apply a numberd acces list to a single outbound interface.

no more three statements that meets these requirements . corp1(config)#access-list 100 permit tcp host (host address) host (finance web server address) eq 80 corp1(config)#access-list 100 deny ip any host (finance web server address) Corp1(config)# access-list 100 permit ip any any Corp1(config)#int fa0/1 Corp1(config-if)#ip access-group 100 out Corp1(config-if)#end Corp1#copy run start

Q.1 Which IPsec security protocol should be used when confidentiality is required? A. PSK B. AH C. MD5 D. ESPokréponse: www.isaserver.com A, B, D ... se référer.

Q.7 Which statement is true, as relates to classful or classless routing? A. Automatic summarization at classful boundries can cause problems on discontinuous subnets B. EIGRP and OSPF are classful routing protocols and summarize routes by default C. RIPv1 and OSPF are classless routing protocols D. Classful routing protocols send the subnet mask in routing updates Answer: A

Which three statements about RSTP are true?

/25 et crossover

Reponse 3

Question 11 as shown above. what is the alternative notation for the IPV6 Address B514:82C3:0000:0000:0029:EC7A:0000:EC72 a) B514:82C3:0029:EC7A:EC72 b) B514:82C3::0029:EC7A:EC72 c) B514:82C3:0029::EC7A:0000:EC72 d) 14:82C3::0029:EC7A:0:EC72 NONE OF THESE ARE RIGHT! Am I missing something?! @Adeel Khan, how can your answer be right when the 2nd to last group of hex

You May Also Find These Documents Helpful

  • Satisfactory Essays

    JG NT2640

    • 333 Words
    • 1 Page

    9. Which of the following is one of the functions of OSI Layer 2 protocols?…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Save Question 10 (1 point) IPsec is used for ________ VPNs. Question 10 options: A) remote-access B) site-to-site C) Both remote-access and site-to-site D)…

    • 268 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210Unit3Lab3

    • 1288 Words
    • 4 Pages

    Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and functions of each of these.…

    • 1288 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 2019 Words
    • 9 Pages

    + 0 + 0 0 0 + 0+ 1 1 0 0 8 + 4 + 0 + 0= 140 Address Classes • There are 5 different…

    • 2019 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    Identify the three IP address classes, the default subnet mask used with each, and the number of hosts for each.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI terms. Which of the following is a correctly phrased statement for how to use OSI terminology? IP is a network layer protocol…

    • 1038 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The classroom network consists of Windows Server 2008 student server A and B a connected to via an internal local area network. NT2670Srv##A the domain controller for the contoso.com domain, is running Windows Server 2008. Throughout the labs in this manual, you will install, configure, maintain, and troubleshoot application roles, features, and services on the NT2670Srv##A.…

    • 1638 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    Ch09 Solutions

    • 1016 Words
    • 5 Pages

    9. In Figure 15-9, the subnet mask is four notches tall and is considered a classless subnet…

    • 1016 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Limit unauthorized use of network resources by allowing access during businiess hours only. Do not allow remote access permitions to anyone, except those that…

    • 563 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Winsec2E Lab02 AW

    • 294 Words
    • 2 Pages

    4. List at least three different types of access control permissions you can enable for…

    • 294 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    unit 3 assignment 3

    • 854 Words
    • 3 Pages

    1. Which of the following is true about a TCP/IP network? A) The network uses only standards defined in TCP/IP RFCs.…

    • 854 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    1. A null session is basically a pseudoaccount that has no username or password, but can used to access information on ___.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Hp Cisco

    • 4787 Words
    • 20 Pages

    Jim Heal of Hewlett-Packard, Inc (HP) and Mike Thomas of Cisco Systems, Inc (Cisco) were both leaders of strategic alliance management teams that were formed in early 1997. Both teams were created to help facilitate the strategic alliance that was formed between HP and Cisco. As with all alliances, a wide variety of issues and challenges emerged that had be to be resolved and it was the purpose of the alliance teams to solve such issues. Beginning in February 2002, a formal contract to expand the HP and Cisco alliance was being negotiated and it was during this time that several important challenges emerged that would require the full attention of Mr. Heal and Mr. Thomas.…

    • 4787 Words
    • 20 Pages
    Best Essays

Related Topics