CCNA – The IT Certification Exam About Computer SecurITy

7 Questions | Total Attempts: 3975

SettingsSettingsSettings
CCNA  The IT Certification Exam About Computer SecurITy

In computer security, an access-control list is a list of permissions associated with a system resource. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Know more about the access list in this quiz!


Questions and Answers
  • 1. 
    Which item represents the standard IP ACL?
    • A. 

      Access-list 50 deny 192.168.1.1 0.0.0.255

    • B. 

      Access-list 110 permit ip any any

    • C. 

      Access-list 2500 deny tcp any host 192.168.1.1 eq 22

    • D. 

      Access-list 101 deny tcp any host 192.168.1.1

  • 2. 
    A network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts on networks 192.168.146.0, 192.168.147.0, 192.168.148.0, and 192.168.149.0 only. Which two ACL statements, when combined, would you use to accomplish this task? (Choose two)
    • A. 

      Access-list 10 permit ip 192.168.146.0 0.0.1.255

    • B. 

      Access-list 10 permit ip 192.168.147.0 0.0.255.255

    • C. 

      Access-list 10 permit ip 192.168.148.0 0.0.1.255

    • D. 

      Access-list 10 permit ip 192.168.149.0 0.0.255.255

    • E. 

      Access-list 10 permit ip 192.168.146.0 0.0.0.255

    • F. 

      Access-list 10 permit ip 192.168.146.0 255.255.255.0

  • 3. 
    Refer to the exhibit.An attempt to deny web access to a subnet blocks all traffic from the subnet. Which interface command immediately removes the effect of ACL 102?
    • A. 

      No ip access-class 102 in

    • B. 

      No ip access-class 102 out

    • C. 

      No ip access-group 102 in

    • D. 

      No ip access-group 102 out

    • E. 

      No ip access-list 102 in

  • 4. 
    On which options are standard access lists based?
    • A. 

      Destination address and wildcard mask

    • B. 

      Destination address and subnet mask

    • C. 

      Source address and subnet mask

    • D. 

      Source address and wildcard mask

  • 5. 
    Refer to the exhibit.Statements A, B, C, and D of ACL 10 have been entered in the shown order and applied to interface E0 inbound, to prevent all hosts (except those whose addresses are the first and last IP of subnet 172.21.1.128/28) from accessing the network. But as is, the ACL does not restrict anyone from the network. How can the ACL statements be re-arranged so that the system works as intended?
    • A. 

      ACDB

    • B. 

      BADC

    • C. 

      DBAC

    • D. 

      CDBA

  • 6. 
    Which statement about access lists that are applied to an interface is true?
    • A. 

      You can apply only one access list on any interface

    • B. 

      You can configure one access list, per direction, per layer 3 protocol

    • C. 

      You can place as many access lists as you want on any interface

    • D. 

      You can configure one access list, per direction, per layer 2 protocol

  • 7. 
    A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the internet. Which ACL can be used?
    • A. 

      Reflexive

    • B. 

      Extended

    • C. 

      Standard

    • D. 

      Dynamic

Related Topics
Back to Top Back to top