Access-list - Practice Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Apalani
A
Apalani
Community Contributor
Quizzes Created: 17 | Total Attempts: 69,313
Questions: 13 | Attempts: 1,467

SettingsSettingsSettings
Access-list - Practice Test - Quiz

The IP Multimedia Private Identity (IMPI) is a unique global identity allocated to a home network operator. It is very specific and every IMS user shall has one IMPI. How conversant are you with the use and creation of IP addresses? Take up this quiz and find out. All the best!


Questions and Answers
  • 1. 

    What are the two types of IP access lists?

    • A.

      Regular and Standard

    • B.

      Standard and Extended

    • C.

      Even and Odd

    • D.

      None of the above

    Correct Answer
    B. Standard and Extended
    Explanation
    The two types of IP access lists are standard and extended. Standard access lists are used to filter traffic based on the source IP address only, while extended access lists can filter traffic based on source and destination IP addresses, as well as additional criteria such as protocol type, port numbers, etc.

    Rate this question:

  • 2. 

    In standard IP access list, what fields within the IP packet can be tested? 

    • A.

      Source address, destination address

    • B.

      Source address, destination address, protocol, port

    • C.

      Destination address

    • D.

      Source address

    Correct Answer
    D. Source address
    Explanation
    In a standard IP access list, the only field within the IP packet that can be tested is the source address. The source address is used to determine the origin of the packet, allowing the network to control access based on the source of the traffic. The destination address, protocol, and port are not available for testing in a standard IP access list.

    Rate this question:

  • 3. 

    What is the range of Standard IP access list?

    • A.

      0 to 99

    • B.

      1 to 99

    • C.

      100 to 199

    • D.

      1 to 199

    Correct Answer
    B. 1 to 99
    Explanation
    Standard IP access lists have a range from 1 to 99. This means that the access list numbers can be any number between 1 and 99, inclusive.

    Rate this question:

  • 4. 

    Every access list, carries an implicit  __________?

    • A.

      Permit any

    • B.

      Permit any any

    • C.

      Deny any

    Correct Answer
    C. Deny any
    Explanation
    Every access list carries an implicit "deny any" statement. This means that if there is no explicit permit statement for a particular traffic, it will be denied by default. In other words, the access list will deny any traffic that is not specifically permitted.

    Rate this question:

  • 5. 

    What is the command to apply IP access list 101 to an interface? 

    • A.

      Ip access-group 101 [in/out]

    • B.

      Ip access-list 101

    • C.

      Access-list 101

    • D.

      Access-group 101

    Correct Answer
    A. Ip access-group 101 [in/out]
    Explanation
    The correct answer is "ip access-group 101 [in/out]". This command is used to apply an IP access list with the number 101 to an interface. The "in" or "out" keyword specifies the direction in which the access list should be applied, either inbound or outbound traffic.

    Rate this question:

  • 6. 

    What is the default direction of the access-list? 

    • A.

      Inbound

    • B.

      Outbound

    • C.

      In and out

    • D.

      Out and in

    Correct Answer
    B. Outbound
    Explanation
    The default direction of the access-list is outbound. This means that by default, the access-list is applied to traffic leaving the interface. It allows the administrator to control which traffic is allowed to leave the network.

    Rate this question:

  • 7. 

    What does the following access list command do? Access-list 1 permit 172.16.36.0 0.0.0.255

    • A.

      A. permits traffic originating from the 172.16.36.0 subnet

    • B.

      B. permits traffic destine for 172.16.36.0 subnet

    • C.

      C. permits traffic to and from the 172.16.36.0 subnet

    • D.

      D. This is an invalid statement

    Correct Answer
    A. A. permits traffic originating from the 172.16.36.0 subnet
    Explanation
    The given access list command "Access-list 1 permit 172.16.36.0 0.0.0.255" allows traffic originating from the 172.16.36.0 subnet. The command is specifying a permit statement for the source IP address range 172.16.36.0 to 172.16.36.255, which means any traffic originating from this subnet will be allowed through the access list.

    Rate this question:

  • 8. 

    What is accomplished with this access list? Access-list 1 deny 172.16.36.236 0.0.0.0Access-list 1 permit 172.16.36.0 0.0.0.255Access-list 1 deny anyInterface Ethernet 0    Ip address 172.16.36.1 255.255.255.0   Ip access-group 1 in

    • A.

      Blocks all traffic destine for the host 172.16.36.236 but allows all other traffic

    • B.

      Blocks all traffic destine for the host 172.16.36.236 and allows traffic for others only on the 172.16.36.0 subnet

    • C.

      Blocks all traffic originating from the host 172.16.36.236 but allows all other traffic

    • D.

      Blocks all ip traffic originating from the host 172.16.36.236 and allows traffic from others only on the 172.16.36.0 subnet

    Correct Answer
    D. Blocks all ip traffic originating from the host 172.16.36.236 and allows traffic from others only on the 172.16.36.0 subnet
    Explanation
    The given access list is denying all IP traffic originating from the host 172.16.36.236 and allowing traffic from others only on the 172.16.36.0 subnet. This means that any traffic coming from the host 172.16.36.236 will be blocked, but traffic from other hosts within the 172.16.36.0 subnet will be allowed.

    Rate this question:

  • 9. 

    Which access list will block traffic from 192.168.33.8? 

    • A.

      Access-list 1 deny 192.168.33.8 0.0.0.0 access-list 1 deny any

    • B.

      Access-list 1 permit 192.168.33.0 0.0.0.255 access-list 1 deny 192.168.33.8 0.0.0.0 access-list 1 deny any

    • C.

      Access-list 1 deny 192.168.33.8 0.0.0.255 access-list 1 permit 192.168.33.0 0.0.0.0 access-list 1 deny any

    Correct Answer
    A. Access-list 1 deny 192.168.33.8 0.0.0.0 access-list 1 deny any
    Explanation
    The access list "access-list 1 deny 192.168.33.8 0.0.0.0" will block traffic from 192.168.33.8 because it specifically denies traffic from that IP address. The "deny any" statement also contributes to blocking all traffic.

    Rate this question:

  • 10. 

    Where should standard access-list be placed?

    • A.

      Close to the source

    • B.

      Close to the destination

    • C.

      In the core

    • D.

      At the distribution level

    Correct Answer
    B. Close to the destination
    Explanation
    Standard access-lists should be placed close to the destination. This is because standard access-lists filter traffic based on the source IP address only. By placing them close to the destination, unnecessary traffic can be filtered out earlier in the network, reducing network congestion and improving overall network performance. Additionally, placing them close to the destination allows for more granular control over which specific hosts or networks are allowed or denied access.

    Rate this question:

  • 11. 

    What is this access list function?Access-list 1 deny 136.147.27.236 0.0.0.0Access-list 1 permit anyInt ethernet 0   Ip address 136.146.27.1 255.255.255.0   Ipx network 1f3c   Ip access-group 1 in

    • A.

      Keeps traffic originating from 136.146.27.236 from being transmitted through ethernet 0

    • B.

      Keeps traffic destined for 136.146.27.236 from being transmitted through ethernet 0

    • C.

      Keeps all traffic originating from the Ethernet from transmitting through ethernet 0

    • D.

      Keeps all IP traffic originating from the Ethernet from transmitting through ethernet 0

    Correct Answer
    A. Keeps traffic originating from 136.146.27.236 from being transmitted through ethernet 0
    Explanation
    The access list function "access-list 1 deny 136.147.27.236 0.0.0.0" is used to block or deny traffic originating from the IP address 136.146.27.236 from being transmitted through ethernet 0. It prevents any data or packets from that specific IP address from being sent out through that particular interface.

    Rate this question:

  • 12. 

    Is the following access list valid? Access-list 1 deny 136.146.27.236 0.0.0.0 

    • A.

      Yes

    • B.

      No, there is an implied deny any at the end

    • C.

      None of the above

    Correct Answer
    A. Yes
    Explanation
    The given access list is valid because it follows the correct syntax for defining a deny statement. It denies traffic from the specific IP address 136.146.27.236 with a wildcard mask of 0.0.0.0, which means it matches exactly that IP address. Since there are no additional statements or an implied deny any at the end, the access list only denies traffic from that specific IP address and allows all other traffic.

    Rate this question:

  • 13. 

    The acronym ACL is short for ______?

    • A.

      Access Common List

    • B.

      All Control Lines

    • C.

      Access Control List

    • D.

      None of the above

    Correct Answer
    C. Access Control List
    Explanation
    The correct answer is "Access Control List". An Access Control List (ACL) is a list of permissions attached to an object, such as a file or a network resource, that determines which users or system processes are granted access to that object and what operations they can perform on it. ACLs are commonly used in computer security to control access to resources and ensure that only authorized users can access them.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 28, 2011
    Quiz Created by
    Apalani
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.