
CO3513 Revision
Authored by Christopher Finnigan
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Explain this sample ACL.
This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.
This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the egress interface of FastEthernet0/0.
This ACL allows traffic to the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.
This ACL denies traffic from the host with IP address 192.168.1.10 and denies all other traffic. It is then applied to the ingress interface of FastEthernet0/0.
Answer explanation
In this example, we create a standard ACL on Router1 to block traffic from the source IP address 192.168.1.10.
This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.
2.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Explain this sample ACL.
This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the ingress interface of FastEthernet0/0.
This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the egress interface of FastEthernet0/0.
This ACL permits only traffic to the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the ingress interface of FastEthernet0/0.
This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 443 to the destination IP address 192.168.2.10 and port TCP 80. It is applied to the ingress interface of FastEthernet0/0.
Answer explanation
In this example, we create an extended ACL on Router2 to allow traffic from a specific source IP address (192.168.1.10) and port (TCP port 80) to a specific destination IP address (192.168.2.10) and port (TCP port 443)
This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is then applied to the ingress interface of FastEthernet0/0.
3.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Explain this sample ACL.
This ACL denies ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.
This ACL permits only ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.
This ACL permits only ICMP traffic from any source to any destination. It is then applied to the egress interface of FastEthernet0/0.
This ACL permits any traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.
Answer explanation
In this example, we create a named ACL on Router3 to allow ICMP traffic from any source to any destination.
This ACL permits only ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.
4.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Explain this sample ACL.
This ACL denies SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.
This ACL permits only SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.
This ACL permits only SSH traffic to the router from the same network only. It is then applied to the virtual terminal lines on the router.
This ACL permits only SSH traffic to the router from any source.
Answer explanation
This ACL permits only SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of these is NOT a valid reason to have VLANs in your organisation?
Data Confidentiality
Data Integrity
Scalability
Simplicity
Answer explanation
Data Confidentiality: When data is transmitted over the Internet, it can be intercepted by malicious actors.
Data Integrity: VPNs ensure the integrity of the data being transmitted by protecting it from unauthorized modification
Scalability: VPNs are easily scalable, meaning that businesses can add or remove users as needed without significant infrastructure changes.
VLANs require additional configuration and management, which can increase network complexity.
6.
DRAG AND DROP QUESTION
1 min • 2 pts
Based on this network diagram, we would issue the following commands to create the VLAN 20.
(a) and (b)
Answer explanation
(config) vlan 10
(config-vlan) name vlan10
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the following command do:
ipv6 unicast-routing
Enables the device to route IPv6 traffic between different subnets or VLANs on the network.
Disables IPv6 routing between different subnets or VLANs on the network.
Prevents other networks seeing your ipv6 network.
Enables the device to route IPv6 traffic on only the same subnets or VLAN.
Answer explanation
Without this command, the device will not be able to forward IPv6 traffic, even if it has IPv6 addresses configured on its interfaces.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Microsoft Excel 2013 Survey (Basic)
Quiz
•
9th Grade - University
20 questions
Web Designing Quiz-1
Quiz
•
University
19 questions
DBMS - Fundamentals
Quiz
•
University
17 questions
Routing and Networking Quiz
Quiz
•
University
16 questions
AS Computing Communication methods 3.9.1.1
Quiz
•
8th Grade - University
15 questions
8051-MCQ
Quiz
•
University
20 questions
Quiz Remote Server dan SSH Part 1
Quiz
•
11th Grade - University
20 questions
QUIZ 2 CO
Quiz
•
University
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade
Discover more resources for Computers
8 questions
2 Step Word Problems
Quiz
•
KG - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
10 questions
14.2 Independent/Dependent Variables
Quiz
•
KG - University
18 questions
Great Lakes States
Quiz
•
KG - University
7 questions
DNA, Chromosomes, Genes, and Traits: An Intro to Heredity
Interactive video
•
11th Grade - University
7 questions
Reflexive Verbs in Spanish
Lesson
•
9th Grade - University
7 questions
Narrative Writing 1
Interactive video
•
4th Grade - University