
CO3513 Revision

Quiz
•
Computers
•
University
•
Medium

Christopher Finnigan
Used 2+ times
FREE Resource
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Explain this sample ACL.
This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.
This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the egress interface of FastEthernet0/0.
This ACL allows traffic to the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.
This ACL denies traffic from the host with IP address 192.168.1.10 and denies all other traffic. It is then applied to the ingress interface of FastEthernet0/0.
Answer explanation
In this example, we create a standard ACL on Router1 to block traffic from the source IP address 192.168.1.10.
This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.
2.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Explain this sample ACL.
This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the ingress interface of FastEthernet0/0.
This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the egress interface of FastEthernet0/0.
This ACL permits only traffic to the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the ingress interface of FastEthernet0/0.
This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 443 to the destination IP address 192.168.2.10 and port TCP 80. It is applied to the ingress interface of FastEthernet0/0.
Answer explanation
In this example, we create an extended ACL on Router2 to allow traffic from a specific source IP address (192.168.1.10) and port (TCP port 80) to a specific destination IP address (192.168.2.10) and port (TCP port 443)
This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is then applied to the ingress interface of FastEthernet0/0.
3.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Explain this sample ACL.
This ACL denies ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.
This ACL permits only ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.
This ACL permits only ICMP traffic from any source to any destination. It is then applied to the egress interface of FastEthernet0/0.
This ACL permits any traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.
Answer explanation
In this example, we create a named ACL on Router3 to allow ICMP traffic from any source to any destination.
This ACL permits only ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.
4.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Explain this sample ACL.
This ACL denies SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.
This ACL permits only SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.
This ACL permits only SSH traffic to the router from the same network only. It is then applied to the virtual terminal lines on the router.
This ACL permits only SSH traffic to the router from any source.
Answer explanation
This ACL permits only SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of these is NOT a valid reason to have VLANs in your organisation?
Data Confidentiality
Data Integrity
Scalability
Simplicity
Answer explanation
Data Confidentiality: When data is transmitted over the Internet, it can be intercepted by malicious actors.
Data Integrity: VPNs ensure the integrity of the data being transmitted by protecting it from unauthorized modification
Scalability: VPNs are easily scalable, meaning that businesses can add or remove users as needed without significant infrastructure changes.
VLANs require additional configuration and management, which can increase network complexity.
6.
DRAG AND DROP QUESTION
1 min • 2 pts
Based on this network diagram, we would issue the following commands to create the VLAN 20.
(a) and (b)
Answer explanation
(config) vlan 10
(config-vlan) name vlan10
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the following command do:
ipv6 unicast-routing
Enables the device to route IPv6 traffic between different subnets or VLANs on the network.
Disables IPv6 routing between different subnets or VLANs on the network.
Prevents other networks seeing your ipv6 network.
Enables the device to route IPv6 traffic on only the same subnets or VLAN.
Answer explanation
Without this command, the device will not be able to forward IPv6 traffic, even if it has IPv6 addresses configured on its interfaces.
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
ԹԳՀԳ 8 ցանցեր

Quiz
•
10th Grade - University
16 questions
TCP/IP

Quiz
•
University
11 questions
AWS Restart CCP

Quiz
•
University
16 questions
quiz diagnostico cye1860

Quiz
•
University
15 questions
Information Security Lab Quiz # 2

Quiz
•
University
17 questions
CCNA 2 Chapter 7

Quiz
•
University
20 questions
From Binary To Denary Conversion - IGCSE

Quiz
•
7th Grade - Professio...
20 questions
IT325 Part II

Quiz
•
University
Popular Resources on Wayground
10 questions
SR&R 2025-2026 Practice Quiz

Quiz
•
6th - 8th Grade
30 questions
Review of Grade Level Rules WJH

Quiz
•
6th - 8th Grade
6 questions
PRIDE in the Hallways and Bathrooms

Lesson
•
12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
15 questions
Subtracting Integers

Quiz
•
7th Grade
Discover more resources for Computers
15 questions
Let's Take a Poll...

Quiz
•
9th Grade - University
2 questions
Pronouncing Names Correctly

Quiz
•
University
34 questions
WH - Unit 2 Exam Review -B

Quiz
•
10th Grade - University
21 questions
Mapa países hispanohablantes

Quiz
•
1st Grade - University
10 questions
Transition Words

Quiz
•
University
5 questions
Theme

Interactive video
•
4th Grade - University
25 questions
Identifying Parts of Speech

Quiz
•
8th Grade - University
10 questions
Spanish Greetings and Goodbyes!

Lesson
•
6th Grade - University