
Module 5 - ACL for IPv4 Review
Authored by Alicia Pierce
Computers
12th Grade
Used 31+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)
access-list standard VTY permit 10.7.0.0.0.0.0.127
ip access-group 5 in
ip access-group 5 out
access-list 5 permit 10.7.0.0.0.0.0.31
access-class 5 in
2.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Consider the configured access list.
R1# show access-lists
extended IP access list 100
deny tcp host 10.1.1.2 host 10.1.1.1 eq telnet
deny tcp host 10.1.2.2 host 10.1.2.1 eq telnet
permit ip any any (15 matches)
Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address 192.168.10.254 assigned? (Choose two.)
Any device on the 10.1.1.0/24 network (except the 10.1.1.2 device) can telenet to the router that has the IP address 10.1.1.1 assigned.
A network administrator would not be able to tell if the access list has been applied to an interface or not.
Only the 10.1.1.2 device can telnet to the router that has the 10.1.1.1 IP address assigned.
The access list has been applied to an interface.
Any device can telnet to the 10.1.2.1 device.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which command will verify the number of packets that are permitted or denied by an ACL that restricts SSH access?
show running-config
show ip ssh
show ip interface brief
show access-lists
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
When configuring router security, which statement describes the most effective way to use ACLs to control Telnet traffic that is destined to the router itself?
The ACL is applied to the Telnet port with the ip access-group command.
The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.
Apply the ACL to the vty lines without the in and out option required when applying ACLs to interfaces.
The ACL must be applied to each vty line individually.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What packets would match the access control list statement that is shown below?
access-list 110 permit tcp 172.16.0.0 0.0.0.255 any eq 22
any TCP traffic from the 172.16.0.0 network to the destination network.
SSH traffic from the 172.16.0.0 network to any destination network
SSH traffic from the source network to the 172.16.0.0 network.
any TCP traffic from the host to the 172.16.0.0 network.
6.
MULTIPLE SELECT QUESTION
1 min • 1 pt
A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)
Router1(config)# access-list 10 permit host 192.168.15.23
Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0
Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.255
Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.0
Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.255
Answer explanation
o permit or deny one specific IP address, either the wildcard mask 0.0.0.0 (used after the IP address) or the wildcard mask keyword host (used before the IP address) can be used.
This item references content from the following areas:
Enterprise Networking, Security, and Automation1.5.1 Configure Standard IPv4 ACLs
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Refer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached to R1?
access-list 1 permit 192.168.10.0 0.0.0.63
access-list 1 permit 192.168.10.96 0.0.0.31
access-list 1 permit 192.168.10.0 0.0.0.255
access-list 1 permit 192.168.10.128 0.0.0.63
Answer explanation
tandard access lists only filter on the source IP address. In the design, the packets would be coming from the 192.168.10.96/27 network (the R2 G0/0 network). The correct ACL is access-list 1 permit 192.168.10.96 0.0.0.31 .
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
30 questions
Lesson 3_Animating Symbols (Adobe Animate)
Quiz
•
9th - 12th Grade
25 questions
Evaluasi Bab 4
Quiz
•
12th Grade
25 questions
Code HS 3.19 Intro to Programming w/Karel
Quiz
•
9th - 12th Grade
25 questions
SMKM3 - AIJ Kelas XII
Quiz
•
12th Grade
25 questions
ynhis1
Quiz
•
9th - 12th Grade
25 questions
MEDIA AND INFORMATION LITERACY
Quiz
•
12th Grade
25 questions
RPL quiz
Quiz
•
9th - 12th Grade
25 questions
Java Review
Quiz
•
9th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade