Search Header Logo

Module 5 - ACL for IPv4 Review

Authored by Alicia Pierce

Computers

12th Grade

Used 31+ times

Module 5 - ACL for IPv4 Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)

access-list standard VTY permit 10.7.0.0.0.0.0.127

ip access-group 5 in

ip access-group 5 out

access-list 5 permit 10.7.0.0.0.0.0.31

access-class 5 in

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Consider the configured access list. 

R1# show access-lists

extended IP access list 100

deny tcp host 10.1.1.2 host 10.1.1.1 eq telnet

deny tcp host 10.1.2.2 host 10.1.2.1 eq telnet

permit ip any any (15 matches)

Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address 192.168.10.254 assigned? (Choose two.)

Any device on the 10.1.1.0/24 network (except the 10.1.1.2 device) can telenet to the router that has the IP address 10.1.1.1 assigned.

A network administrator would not be able to tell if the access list has been applied to an interface or not.

Only the 10.1.1.2 device can telnet to the router that has the 10.1.1.1 IP address assigned.

The access list has been applied to an interface.

Any device can telnet to the 10.1.2.1 device.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which command will verify the number of packets that are permitted or denied by an ACL that restricts SSH access?

show running-config

show ip ssh

show ip interface brief

show access-lists

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When configuring router security, which statement describes the most effective way to use ACLs to control Telnet traffic that is destined to the router itself?

The ACL is applied to the Telnet port with the ip access-group command.

The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.

Apply the ACL to the vty lines without the in and out option required when applying ACLs to interfaces.

The ACL must be applied to each vty line individually.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What packets would match the access control list statement that is shown below?

access-list 110 permit tcp 172.16.0.0 0.0.0.255 any eq 22

any TCP traffic from the 172.16.0.0 network to the destination network.

SSH traffic from the 172.16.0.0 network to any destination network

SSH traffic from the source network to the 172.16.0.0 network.

any TCP traffic from the host to the 172.16.0.0 network.

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)

Router1(config)# access-list 10 permit host 192.168.15.23

Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0

Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.255

Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.0

Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.255

Answer explanation

o permit or deny one specific IP address, either the wildcard mask 0.0.0.0 (used after the IP address) or the wildcard mask keyword host (used before the IP address) can be used.

This item references content from the following areas:

Enterprise Networking, Security, and Automation1.5.1 Configure Standard IPv4 ACLs

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Refer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached to R1?

access-list 1 permit 192.168.10.0 0.0.0.63

access-list 1 permit 192.168.10.96 0.0.0.31

access-list 1 permit 192.168.10.0 0.0.0.255

access-list 1 permit 192.168.10.128 0.0.0.63

Answer explanation

tandard access lists only filter on the source IP address. In the design, the packets would be coming from the 192.168.10.96/27 network (the R2 G0/0 network). The correct ACL is access-list 1 permit 192.168.10.96 0.0.0.31 .

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?