The Candid Test On CCENT/CCNA Icnd2 Chapt. 6

7 Questions | Total Attempts: 196

SettingsSettingsSettings
CCENT Quizzes & Trivia

As we continue revising for the final CCENT/CCNA exam it is growing more and more important for one to be on their toes before the exam. Take the quiz below specifically designed to help you tackle any question that may arise in that specific chapter. All the best in your studies!


Questions and Answers
  • 1. 
    Barney is a host with IP address 10.1.1.1 in subnet 10.1.1.0/24. Which of the following are things that a standard IP ACL could be configured to do?
    • A. 

      Match the exact source IP address

    • B. 

      Match IP addresses 10.1.1.1 through 10.1.1.4 with one access-list command without matching other IP addresses

    • C. 

      Match all IP addresses in Barney’s subnet with one access-list command without matching other IP addresses

    • D. 

      Match only the packet’s destination IP address

  • 2. 
    • A. 

      0.0.0.0

    • B. 

      0.0.0.31

    • C. 

      0.0.0.240

    • D. 

      0.0.0.255

    • E. 

      0.0.15.255

  • 3. 
    Which of the following access-list commands permits traffic that matches packets going to any web client from all web servers whose IP addresses begin with 172.16.5?
    • A. 

      Access-list 101 permit tcp host 10.1.1.1 172.16.5.0 0.0.0.255 eq www

    • B. 

      Access-list 1951 permit ip host 10.1.1.1 172.16.5.0 0.0.0.255 eq www

    • C. 

      Access-list 2523 permit tcp any eq www 172.16.5.0 0.0.0.255

    • D. 

      Access-list 2523 permit tcp 172.16.5.0 0.0.0.255 eq www 172.16.5.0 0.0.0.255

    • E. 

      Access-list 2523 permit tcp 172.16.5.0 0.0.0.255 eq www any

  • 4. 
    Which of the following fields can be compared using a named extended IP ACL but not a numbered extended IP ACL?
    • A. 

      Protocol

    • B. 

      Source IP address

    • C. 

      Destination IP address

    • D. 

      TOS byte

    • E. 

      None of the other answers are correct.

  • 5. 
    In a router running IOS 12.3, an engineer needs to delete the second line in ACL 101, which currently has four commands configured. Which of the following options could be used?
    • A. 

      Delete the entire ACL and reconfigure the three ACL statements that should remain in the ACL.

    • B. 

      Delete one line from the ACL using the no access-list... command.

    • C. 

      Delete one line from the ACL by entering ACL configuration mode for the ACL and then deleting only the second line based on its sequence number.

    • D. 

      Delete the last three lines from the ACL from ACL configuration mode, and then add the last two statements back into the ACL.

  • 6. 
    What general guideline should you follow when placing extended IP ACLs?
    • A. 

      Perform all filtering on output if at all possible.

    • B. 

      Put more-general statements early in the ACL.

    • C. 

      Filter packets as close to the source as possible.

    • D. 

      Order the ACL commands based on the source IP addresses, lowest to highest, to improve performance.

  • 7. 
    Which of the following tools requires the end user to telnet to a router to gain access to hosts on the other side of the router?
    • A. 

      Named ACLs

    • B. 

      Reflexive ACLs

    • C. 

      Dynamic ACLs

    • D. 

      Time-based ACLs