CO3513 Revision

CO3513 Revision

University

16 Qs

quiz-placeholder

Similar activities

CCNA

CCNA

University

17 Qs

Latihan IP Address dan Subnetting - 2TID - 111219

Latihan IP Address dan Subnetting - 2TID - 111219

University

20 Qs

EXAMEN DE REDES

EXAMEN DE REDES

University

20 Qs

UAS Keamanan Sistem Informasi 2019 - A

UAS Keamanan Sistem Informasi 2019 - A

University

20 Qs

Quiz sobre Redes Informáticas

Quiz sobre Redes Informáticas

9th Grade - University

20 Qs

NET1L - Lesson 5 (Number Systems)

NET1L - Lesson 5 (Number Systems)

University

21 Qs

Redes 1

Redes 1

University

20 Qs

Exploring WAN Technologies and Security

Exploring WAN Technologies and Security

University

15 Qs

CO3513 Revision

CO3513 Revision

Assessment

Quiz

Computers

University

Medium

Created by

Christopher Finnigan

Used 2+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Media Image

Explain this sample ACL.

This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.

This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the egress interface of FastEthernet0/0.

This ACL allows traffic to the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.

This ACL denies traffic from the host with IP address 192.168.1.10 and denies all other traffic. It is then applied to the ingress interface of FastEthernet0/0.

Answer explanation

In this example, we create a standard ACL on Router1 to block traffic from the source IP address 192.168.1.10.

This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Media Image

Explain this sample ACL.

This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the ingress interface of FastEthernet0/0.

This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the egress interface of FastEthernet0/0.

This ACL permits only traffic to the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the ingress interface of FastEthernet0/0.

This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 443 to the destination IP address 192.168.2.10 and port TCP 80. It is applied to the ingress interface of FastEthernet0/0.

Answer explanation

In this example, we create an extended ACL on Router2 to allow traffic from a specific source IP address (192.168.1.10) and port (TCP port 80) to a specific destination IP address (192.168.2.10) and port (TCP port 443)

This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is then applied to the ingress interface of FastEthernet0/0.

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Media Image

Explain this sample ACL.

This ACL denies ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.

This ACL permits only ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.

This ACL permits only ICMP traffic from any source to any destination. It is then applied to the egress interface of FastEthernet0/0.

This ACL permits any traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.

Answer explanation

In this example, we create a named ACL on Router3 to allow ICMP traffic from any source to any destination.

This ACL permits only ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Media Image

Explain this sample ACL.

This ACL denies SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.

This ACL permits only SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.

This ACL permits only SSH traffic to the router from the same network only. It is then applied to the virtual terminal lines on the router.

This ACL permits only SSH traffic to the router from any source.

Answer explanation

This ACL permits only SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of these is NOT a valid reason to have VLANs in your organisation?

Data Confidentiality

Data Integrity

Scalability

Simplicity

Answer explanation

Data Confidentiality: When data is transmitted over the Internet, it can be intercepted by malicious actors.

Data Integrity: VPNs ensure the integrity of the data being transmitted by protecting it from unauthorized modification

Scalability: VPNs are easily scalable, meaning that businesses can add or remove users as needed without significant infrastructure changes.

VLANs require additional configuration and management, which can increase network complexity.

6.

DRAG AND DROP QUESTION

1 min • 2 pts

Media Image

Based on this network diagram, we would issue the following commands to create the VLAN 20.

​ (a)   and ​ (b)  

(config) vlan 20
(config-vlan) name VLAN20
(config) vlan named 20
(config-vlan) VLAN20
(config-vlan) config VLAN10
(config) vlan int 20

Answer explanation

(config) vlan 10

(config-vlan) name vlan10

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the following command do:

ipv6 unicast-routing  

Enables the device to route IPv6 traffic between different subnets or VLANs on the network.

Disables IPv6 routing between different subnets or VLANs on the network.

Prevents other networks seeing your ipv6 network.

Enables the device to route IPv6 traffic on only the same subnets or VLAN.

Answer explanation

Without this command, the device will not be able to forward IPv6 traffic, even if it has IPv6 addresses configured on its interfaces.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?