Search Header Logo

CO3513 Revision

Authored by Christopher Finnigan

Computers

University

Used 2+ times

CO3513 Revision
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Media Image

Explain this sample ACL.

This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.

This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the egress interface of FastEthernet0/0.

This ACL allows traffic to the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.

This ACL denies traffic from the host with IP address 192.168.1.10 and denies all other traffic. It is then applied to the ingress interface of FastEthernet0/0.

Answer explanation

In this example, we create a standard ACL on Router1 to block traffic from the source IP address 192.168.1.10.

This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Media Image

Explain this sample ACL.

This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the ingress interface of FastEthernet0/0.

This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the egress interface of FastEthernet0/0.

This ACL permits only traffic to the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the ingress interface of FastEthernet0/0.

This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 443 to the destination IP address 192.168.2.10 and port TCP 80. It is applied to the ingress interface of FastEthernet0/0.

Answer explanation

In this example, we create an extended ACL on Router2 to allow traffic from a specific source IP address (192.168.1.10) and port (TCP port 80) to a specific destination IP address (192.168.2.10) and port (TCP port 443)

This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is then applied to the ingress interface of FastEthernet0/0.

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Media Image

Explain this sample ACL.

This ACL denies ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.

This ACL permits only ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.

This ACL permits only ICMP traffic from any source to any destination. It is then applied to the egress interface of FastEthernet0/0.

This ACL permits any traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.

Answer explanation

In this example, we create a named ACL on Router3 to allow ICMP traffic from any source to any destination.

This ACL permits only ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Media Image

Explain this sample ACL.

This ACL denies SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.

This ACL permits only SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.

This ACL permits only SSH traffic to the router from the same network only. It is then applied to the virtual terminal lines on the router.

This ACL permits only SSH traffic to the router from any source.

Answer explanation

This ACL permits only SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of these is NOT a valid reason to have VLANs in your organisation?

Data Confidentiality

Data Integrity

Scalability

Simplicity

Answer explanation

Data Confidentiality: When data is transmitted over the Internet, it can be intercepted by malicious actors.

Data Integrity: VPNs ensure the integrity of the data being transmitted by protecting it from unauthorized modification

Scalability: VPNs are easily scalable, meaning that businesses can add or remove users as needed without significant infrastructure changes.

VLANs require additional configuration and management, which can increase network complexity.

6.

DRAG AND DROP QUESTION

1 min • 2 pts

Media Image

Based on this network diagram, we would issue the following commands to create the VLAN 20.

​ (a)   and ​ (b)  

(config) vlan 20
(config-vlan) name VLAN20
(config) vlan named 20
(config-vlan) VLAN20
(config-vlan) config VLAN10
(config) vlan int 20

Answer explanation

(config) vlan 10

(config-vlan) name vlan10

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the following command do:

ipv6 unicast-routing  

Enables the device to route IPv6 traffic between different subnets or VLANs on the network.

Disables IPv6 routing between different subnets or VLANs on the network.

Prevents other networks seeing your ipv6 network.

Enables the device to route IPv6 traffic on only the same subnets or VLAN.

Answer explanation

Without this command, the device will not be able to forward IPv6 traffic, even if it has IPv6 addresses configured on its interfaces.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?