Module 5 - ACL for IPv4 Review

Module 5 - ACL for IPv4 Review

12th Grade

30 Qs

quiz-placeholder

Similar activities

Level 9

Level 9

9th - 12th Grade

25 Qs

CONDITIONAL STATEMENTS

CONDITIONAL STATEMENTS

11th - 12th Grade

25 Qs

PH JARINGAN KOMPUTER DAN INTERNET K8 T.A.2425

PH JARINGAN KOMPUTER DAN INTERNET K8 T.A.2425

8th Grade - University

25 Qs

MTA Networking Fundamentals Review Part 2

MTA Networking Fundamentals Review Part 2

9th - 12th Grade

25 Qs

1.1.1. Structure and function of the processor

1.1.1. Structure and function of the processor

12th Grade

34 Qs

Data Structure - Trees

Data Structure - Trees

12th Grade

25 Qs

AIJ

AIJ

12th Grade

25 Qs

PTS GENAP DDAKL SPEADSHEET 2025

PTS GENAP DDAKL SPEADSHEET 2025

10th Grade - University

25 Qs

Module 5 - ACL for IPv4 Review

Module 5 - ACL for IPv4 Review

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Alicia Pierce

Used 31+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)

access-list standard VTY permit 10.7.0.0.0.0.0.127

ip access-group 5 in

ip access-group 5 out

access-list 5 permit 10.7.0.0.0.0.0.31

access-class 5 in

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Consider the configured access list. 

R1# show access-lists

extended IP access list 100

deny tcp host 10.1.1.2 host 10.1.1.1 eq telnet

deny tcp host 10.1.2.2 host 10.1.2.1 eq telnet

permit ip any any (15 matches)

Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address 192.168.10.254 assigned? (Choose two.)

Any device on the 10.1.1.0/24 network (except the 10.1.1.2 device) can telenet to the router that has the IP address 10.1.1.1 assigned.

A network administrator would not be able to tell if the access list has been applied to an interface or not.

Only the 10.1.1.2 device can telnet to the router that has the 10.1.1.1 IP address assigned.

The access list has been applied to an interface.

Any device can telnet to the 10.1.2.1 device.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which command will verify the number of packets that are permitted or denied by an ACL that restricts SSH access?

show running-config

show ip ssh

show ip interface brief

show access-lists

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When configuring router security, which statement describes the most effective way to use ACLs to control Telnet traffic that is destined to the router itself?

The ACL is applied to the Telnet port with the ip access-group command.

The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.

Apply the ACL to the vty lines without the in and out option required when applying ACLs to interfaces.

The ACL must be applied to each vty line individually.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What packets would match the access control list statement that is shown below?

access-list 110 permit tcp 172.16.0.0 0.0.0.255 any eq 22

any TCP traffic from the 172.16.0.0 network to the destination network.

SSH traffic from the 172.16.0.0 network to any destination network

SSH traffic from the source network to the 172.16.0.0 network.

any TCP traffic from the host to the 172.16.0.0 network.

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)

Router1(config)# access-list 10 permit host 192.168.15.23

Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0

Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.255

Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.0

Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.255

Answer explanation

o permit or deny one specific IP address, either the wildcard mask 0.0.0.0 (used after the IP address) or the wildcard mask keyword host (used before the IP address) can be used.

This item references content from the following areas:

Enterprise Networking, Security, and Automation1.5.1 Configure Standard IPv4 ACLs

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Refer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached to R1?

access-list 1 permit 192.168.10.0 0.0.0.63

access-list 1 permit 192.168.10.96 0.0.0.31

access-list 1 permit 192.168.10.0 0.0.0.255

access-list 1 permit 192.168.10.128 0.0.0.63

Answer explanation

tandard access lists only filter on the source IP address. In the design, the packets would be coming from the 192.168.10.96/27 network (the R2 G0/0 network). The correct ACL is access-list 1 permit 192.168.10.96 0.0.0.31 .

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?