Quiz On ACL And Switch

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Zenaida Agulto
Z
Zenaida Agulto
Community Contributor
Quizzes Created: 3 | Total Attempts: 764
Questions: 40 | Attempts: 267

SettingsSettingsSettings
Quiz On ACL And Switch - Quiz

The following quiz will be our FINAL quiz no. 2 on Computer Networks you are only allowed to answer the following questions within an hour. You are required to fill in all the necessary information asked upon registration. You are only allowed to answer the quiz ONCE, The system will automatically detect duplicate response from the user. . DEADLINE OF COMPLETION is until Oct. 11, 2017 only GOOD luck and Enjoy the EXAM. . . -Engr. Ronnel Agulto


Questions and Answers
  • 1. 

    This are lists of conditions used to test network traffic that tries to travel across a router interface. 

    • A.

      Routing Table

    • B.

      Access Control List

    • C.

      VLSM

    • D.

      None of the choices

    Correct Answer
    B. Access Control List
    Explanation
    Access Control Lists (ACLs) are used to control and filter network traffic based on specified conditions. In the context of the given question, ACLs can be used to test network traffic attempting to pass through a router interface. ACLs can be configured to allow or deny traffic based on various criteria such as source/destination IP addresses, protocols, ports, etc. Therefore, ACLs are a suitable choice for testing network traffic attempting to traverse a router interface.

    Rate this question:

  • 2. 

    When making changes, you must remove the access list, using the _______command

    • A.

      No access – list [ list number]

    • B.

      Access – list off [ list number]

    • C.

      Off – access list [ list number]

    • D.

      Access – list [list number]

    Correct Answer
    A. No access – list [ list number]
    Explanation
    The correct answer is "no access – list [ list number]". This command is used to remove an access list from the configuration. By using the "no" keyword followed by "access-list" and the list number, the access list is deleted and the changes are implemented. The other options provided in the question do not represent valid commands in Cisco IOS.

    Rate this question:

  • 3. 

    ACL  unique identification number 600 falls under what protocol?

    • A.

      Apple Talk

    • B.

      IPX

    • C.

      IP

    • D.

      Extended IP

    Correct Answer
    A. Apple Talk
    Explanation
    The correct answer is Apple Talk because ACL unique identification number 600 is associated with Apple Talk protocol.

    Rate this question:

  • 4. 

    A ______in a bit position of the access list mask indicates that the corresponding bit in the address must be checked;

    • A.

      Zero

    • B.

      X

    • C.

      Allow

    • D.

      One

    Correct Answer
    B. X
    Explanation
    A "X" in a bit position of the access list mask indicates that the corresponding bit in the address must be checked. This means that the access list is specifying a specific value for that bit position in order for the address to be allowed or denied.

    Rate this question:

  • 5. 

    The ______option substitutes 0.0.0.0 for the mask. This mask requires that all bits of the ACL address and the packet address match. This option will match just one address. 

    • A.

      Allow

    • B.

      Permit

    • C.

      Any

    • D.

      Host

    Correct Answer
    D. Host
    Explanation
    The "host" option substitutes 0.0.0.0 for the mask. This means that all bits of the ACL address and the packet address need to match in order for the option to be valid. This option will only match one specific address, rather than a range of addresses.

    Rate this question:

  • 6. 

    The _______command links an existing standard ACL to an interface: 

    • A.

      No access-list

    • B.

      Show ip router

    • C.

      Ip access-group

    • D.

      Both A and C

    Correct Answer
    C. Ip access-group
    Explanation
    The correct answer is "ip access-group". This command is used to link an existing standard ACL (Access Control List) to an interface. By applying the ACL to an interface, the specified access restrictions defined in the ACL will be enforced on the traffic passing through that interface.

    Rate this question:

  • 7. 

    •An Access list number range of 100 – 199 and 2000 – 2699 is used with it.

    • A.

      Standard ACL

    • B.

      Special ACL

    • C.

      Extended ACL

    • D.

      Inferior ACL

    Correct Answer
    C. Extended ACL
    Explanation
    The given information states that an access list number range of 100-199 and 2000-2699 is used with it. This indicates that the access list being referred to is an extended access control list (ACL). Extended ACLs allow for more granular control over network traffic by filtering based on source and destination IP addresses, protocols, port numbers, and other criteria. Standard ACLs, on the other hand, only filter based on source IP address. Therefore, the correct answer is Extended ACL.

    Rate this question:

  • 8. 

    ________Masking for IP address bits uses the number 1 and the number 0 to identify how to treat the corresponding IP address bits.

    • A.

      Subnet

    • B.

      Wildcard

    • C.

      ACL

    • D.

      None of the choices

    Correct Answer
    B. Wildcard
    Explanation
    The given correct answer is "Wildcard." In IP address masking, a wildcard is used to identify how to treat the corresponding IP address bits. The wildcard consists of 1s and 0s, where the 1s indicate the bits that should be matched exactly, and the 0s indicate the bits that can be ignored or treated as don't care. This allows for more flexible and granular control over network traffic and access control.

    Rate this question:

  • 9. 

    If the byte of data to be sent is 10011010 what should be the data word that should be received using Hamming Code Detection?

    • A.

      011100101010

    • B.

      111100101010

    • C.

      011101101010

    • D.

      011100101011

    Correct Answer
    A. 011100101010
    Explanation
    The given byte of data, 10011010, should be received as 011100101010 using Hamming Code Detection.

    Rate this question:

  • 10. 

    Which of the following bit will presume an Even Parity bit

    • A.

      010101100011

    • B.

      110101100011

    • C.

      010101000011

    • D.

      011101100011

    Correct Answer
    A. 010101100011
    Explanation
    The given bit sequence has an even number of 1s. In even parity, an additional bit is added to the sequence to make the total number of 1s even. This is done to detect errors in transmission. In this case, the sequence 010101100011 already has an even number of 1s, so it would presume an Even Parity bit.

    Rate this question:

  • 11. 

    The_____option substitutes 0.0.0.0 for the IP address and 255.255.255.255 for the wildcard mask. This option will match any address that it is compared against. 

    • A.

      allow

    • B.

      permit

    • C.

      Any

    • D.

      Host

    Correct Answer
    C. Any
    Explanation
    The "any" option substitutes 0.0.0.0 for the IP address and 255.255.255.255 for the wildcard mask. This means that it will match any address that it is compared against, making it a universal match.

    Rate this question:

  • 12. 

    •Which of the following ACL command is used to display the access-lists configuration

    • A.

      Show access-lists

    • B.

      Show ip interface

    • C.

      Show running-config

    • D.

      None of the choices

    Correct Answer
    A. Show access-lists
    Explanation
    The correct answer is "Show access-lists". This command is used to display the configuration of access lists on a network device. By using this command, network administrators can view the access control entries (ACEs) and their associated parameters, such as source and destination IP addresses, protocols, and port numbers. This information is crucial for troubleshooting network connectivity issues and verifying the effectiveness of the access control policies in place.

    Rate this question:

  • 13. 

    •A _____ in a bit position of the access list mask indicates the corresponding bit in the address is not “interesting” and can be ignored.

    • A.

      Zero

    • B.

      X

    • C.

      Allow

    • D.

      One

    Correct Answer
    D. One
    Explanation
    In an access list mask, a "one" in a bit position indicates that the corresponding bit in the address is not "interesting" and can be ignored. This means that the access list will not consider or match any addresses that have a "one" in that particular bit position.

    Rate this question:

  • 14. 

    •It is an architectural structure that exists between the user and the outside world to protect the internal network from intruders

    • A.

      Server

    • B.

      Autonomous System

    • C.

      Firewall

    • D.

      ACL

    Correct Answer
    C. Firewall
    Explanation
    A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders. It acts as a barrier, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By filtering and blocking unauthorized access attempts, a firewall helps to prevent malicious attacks and maintain the security and integrity of the internal network.

    Rate this question:

  • 15. 

    Which of the following ACL command is used to display the configuration output, including access-lists and assignments

    • A.

      Show access-lists

    • B.

      Show ip interface

    • C.

      Show running-config

    • D.

      None of the choices

    Correct Answer
    C. Show running-config
    Explanation
    The correct answer is "Show running-config" because this command is used to display the complete configuration of a device, including access-lists and assignments. It shows the current running configuration of the device, which includes all the commands and settings that have been applied. This command is commonly used to troubleshoot and verify the configuration of a device.

    Rate this question:

  • 16. 

    •Each port on Cisco Catalyst switches have status LED indicator lights and one of this is the RPS LED. RPS stands for?

    • A.

      Recovery Power System

    • B.

      Redundant Power System

    • C.

      Recovery Power Supply

    • D.

      Redundant Power Supply

    Correct Answer
    B. Redundant Power System
    Explanation
    The RPS LED on Cisco Catalyst switches stands for Redundant Power System. This LED indicates the status of the redundant power system, which provides backup power in case the primary power source fails.

    Rate this question:

  • 17. 

    To remove a standard ACL which command is to be used?

    • A.

      Router>no access-list access-list-number

    • B.

      Router(config)#no access-list access-list-number

    • C.

      Router(config-run)#no access-list access-list-number

    • D.

      None of the choices

    Correct Answer
    B. Router(config)#no access-list access-list-number
    Explanation
    The correct answer is "Router(config)#no access-list access-list-number." This command is used to remove a standard ACL from the router's configuration. By entering this command in the global configuration mode, followed by the specific access-list number, the router will remove the specified access-list from its configuration.

    Rate this question:

  • 18. 

    Which of the following ACL command is used to display the access-lists interface assignments

    • A.

      Show access-lists

    • B.

      Show ip interface

    • C.

      Show running-config

    • D.

      Show running-config

    Correct Answer
    B. Show ip interface
    Explanation
    The correct answer is "Show ip interface". This command is used to display the access-lists interface assignments. It shows the access control lists (ACLs) that are applied to specific interfaces on a device. By using this command, network administrators can quickly view the ACLs that are configured on each interface, allowing them to verify the access control policies in place and troubleshoot any connectivity issues that may be related to ACL configurations.

    Rate this question:

  • 19. 

    •Types of communication where it can send or receive data at a time

    • A.

      Half Duplex

    • B.

      Half Duplex

    • C.

      Half Duplex

    • D.

      Full Duplex

    Correct Answer
    A. Half Duplex
    Explanation
    Half Duplex communication refers to a type of communication where data can be sent or received, but not simultaneously. In this mode, communication can happen in both directions, but only one direction at a time. It is like a walkie-talkie where one person can speak while the other person listens, and then they switch roles. This is different from Full Duplex communication where data can be sent and received simultaneously, like in a telephone conversation. Therefore, the correct answer in this case is Half Duplex.

    Rate this question:

  • 20. 

    CISCO IOS command to return to the privileged EXEC mode.

    • A.

      End

    • B.

      No shutdown

    • C.

      Copy run start

    • D.

      Interface VLAN

    Correct Answer
    A. End
    Explanation
    The "end" command is used to return to the privileged EXEC mode in Cisco IOS. When entered, this command allows the user to exit the current configuration mode and return to the privileged mode, where they have access to all the commands and features available to the administrator.

    Rate this question:

  • 21. 

    •Types of communication where it can send and receive data simultaneously

    • A.

      Half Duplex

    • B.

      Serial

    • C.

      Parallel

    • D.

      Full Duplex

    Correct Answer
    D. Full Duplex
    Explanation
    Full Duplex is the correct answer because it refers to a type of communication where data can be sent and received simultaneously. In Full Duplex communication, both parties can transmit and receive data at the same time, allowing for faster and more efficient communication. This is in contrast to Half Duplex communication, where data can only be sent or received at a time, and Serial and Parallel communication, which do not necessarily involve simultaneous sending and receiving of data.

    Rate this question:

  • 22. 

    It is a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire.

    • A.

      ACL

    • B.

      VLAN

    • C.

      LAN

    • D.

      INTRANET

    Correct Answer
    B. VLAN
    Explanation
    A VLAN (Virtual Local Area Network) is a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire. VLANs provide a way to segment a network without physically separating the devices. By creating virtual networks, VLANs allow for better network management, improved security, and more efficient use of network resources.

    Rate this question:

  • 23. 

    •CISCO IOS command to enter global configuration mode

    • A.

      Configure terminal

    • B.

      Ip address (ip address)

    • C.

      Ip address (ip address)

    • D.

      No shutdown

    Correct Answer
    A. Configure terminal
    Explanation
    The correct answer is "configure terminal" because it is the CISCO IOS command used to enter global configuration mode. This mode allows the user to configure various settings and parameters for the device. The other commands mentioned in the question, such as "ip address" and "no shutdown," are used to configure specific settings within global configuration mode, but "configure terminal" is the initial command to access this mode.

    Rate this question:

  • 24. 

    VLAN 0 is used for?

    • A.

      Option 1FDDI and Token ring

    • B.

      Ethernet VLAN

    • C.

      Configuring extended VLAN

    • D.

      System used only

    Correct Answer
    D. System used only
    Explanation
    VLAN 0 is used for system used only. This means that VLAN 0 is reserved for internal use within the networking system and cannot be assigned to any specific network or device. It is typically used for administrative purposes or for special system functions that do not require communication with external networks or devices.

    Rate this question:

  • 25. 

    CISCO IOS command to save the running config to start up config

    • A.

      End

    • B.

      No shutdown

    • C.

      Copy run start

    • D.

      Interface VLAN

    Correct Answer
    C. Copy run start
    Explanation
    The correct answer is "copy run start". This command is used in Cisco IOS to save the running configuration to the startup configuration. The "copy" command is used to copy files, and in this case, it is used to copy the running configuration (run) to the startup configuration (start). This ensures that any changes made to the running configuration are saved and will persist after a reboot.

    Rate this question:

  • 26. 

    PoE stands for?

    • A.

      Power over electronics

    • B.

      Property on Electronics

    • C.

      Power on Ethernet

    • D.

      Power over Ethernet

    Correct Answer
    D. Power over Ethernet
    Explanation
    Power over Ethernet (PoE) refers to a technology that allows the transmission of both power and data over an Ethernet cable. This eliminates the need for separate power cables, making it more convenient and cost-effective for devices such as IP cameras, wireless access points, and VoIP phones. Therefore, the correct answer is "Power over Ethernet."

    Rate this question:

  • 27. 

    This VLAN number is the CISCO default.

    • A.

      4095

    • B.

      0

    • C.

      1

    • D.

      2

    Correct Answer
    C. 1
  • 28. 

    This feature is used to automatic detect cable type

    • A.

      mdix auto

    • B.

      Duplex auto

    • C.

      Speed auto

    • D.

      None of the choices

    Correct Answer
    A. mdix auto
    Explanation
    The correct answer is "mdix auto" because this feature is used to automatically detect the type of cable being used. By setting it to "auto," the device will determine whether the cable is a straight-through or crossover cable and adjust accordingly. This ensures the proper communication between devices without the need for manual cable configuration.

    Rate this question:

  • 29. 

    This VLAN number is the cisco Default for FDDI and Token Ring

    • A.

      2-1001

    • B.

      1002 -1005

    • C.

      1006 -4094

    • D.

      0 , 4095

    Correct Answer
    B. 1002 -1005
    Explanation
    The VLAN numbers 1002-1005 are the Cisco default VLANs for FDDI (Fiber Distributed Data Interface) and Token Ring. These VLANs are reserved for these specific network technologies and are used for management and control purposes. VLANs 2-1001 and 1006-4094 are user-defined VLANs, while VLANs 0 and 4095 are reserved VLANs with special meanings.

    Rate this question:

  • 30. 

    •The following are VLAN parameter when you create VLAN except for one which is?

    • A.

      VLAN number

    • B.

      VLAN name

    • C.

      VLAN type

    • D.

      VLAN mode

    Correct Answer
    D. VLAN mode
    Explanation
    The VLAN mode is not a parameter when creating a VLAN. VLAN mode refers to the different ways in which VLANs can be configured, such as access mode or trunk mode, but it is not a specific parameter that is set when creating a VLAN.

    Rate this question:

  • 31. 

    •When auto-MDIX is enabled, the interface automatically detects and configures the connection appropriately

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    When auto-MDIX is enabled on a network interface, it allows the interface to automatically detect the type of cable being used (straight-through or crossover) and configure the connection appropriately. This means that regardless of the cable being used, the interface will adjust the transmit and receive pairs accordingly, eliminating the need for manual configuration or the use of a crossover cable. Therefore, the given statement is true.

    Rate this question:

  • 32. 

    ACL lists tell the router what types of packets to accept or deny.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    ACL (Access Control List) lists are used to control network traffic by specifying what types of packets should be allowed or denied by a router. They can be configured to permit or deny packets based on various criteria such as source/destination IP address, protocol, port number, etc. By defining rules in an ACL list, the router can determine which packets should be accepted and forwarded and which should be rejected. Therefore, the statement "ACL lists tell the router what types of packets to accept or deny" is true.

    Rate this question:

  • 33. 

    •The boot loader can also be used to manage the switch if the IOS can’t be loaded

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The boot loader is a small program that runs when a device is powered on and is responsible for loading the operating system. In some cases, the IOS (Internetwork Operating System) may fail to load properly, preventing the switch from functioning. In such situations, the boot loader can be used to manage the switch and troubleshoot the issue. Therefore, the statement that the boot loader can be used to manage the switch if the IOS can't be loaded is true.

    Rate this question:

  • 34. 

    If managing the switch from a remote network, a default gateway must also be configured

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    When managing a switch from a remote network, a default gateway must be configured. A default gateway is the IP address of the router that connects the switch to other networks. It allows the switch to send and receive data to and from devices on different networks. Without a default gateway, the switch would not be able to communicate with devices outside of its local network. Therefore, it is necessary to configure a default gateway when managing a switch remotely.

    Rate this question:

  • 35. 

    •Each ACL must have a unique identification number assigned to it.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Each Access Control List (ACL) is a set of rules that determine what traffic is allowed or denied on a network. To ensure proper management and identification, each ACL must have a unique identification number assigned to it. This allows administrators to easily identify and reference specific ACLs when configuring and troubleshooting network security. Therefore, the statement is true.

    Rate this question:

  • 36. 

    An ACL containing numbered ACL statements can be altered

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    An ACL (Access Control List) containing numbered ACL statements cannot be altered. Numbered ACL statements are fixed and cannot be modified once they are created. To make changes to an ACL, it needs to be completely replaced with a new ACL that includes the desired alterations. Therefore, the given statement is false.

    Rate this question:

  • 37. 

    An ACL containing numbered ACL statements can be altered

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    An ACL (Access Control List) is a set of rules that determines the access permissions for a network device or system. Numbered ACL statements refer to the specific rules within the ACL that are identified by numbers. These statements define what traffic is allowed or denied based on various criteria such as source/destination IP addresses, protocols, or ports. The ability to alter an ACL means that the administrator can modify or change these rules as needed, allowing for flexibility in managing network security and access control. Therefore, the statement "An ACL containing numbered ACL statements can be altered" is true.

    Rate this question:

  • 38. 

    Runts are packets that are discarded because they exceed the maximum packet size for medium 

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. Runts are not discarded packets that exceed the maximum packet size for medium. In fact, runts are undersized packets that are smaller than the minimum packet size required. These undersized packets are typically caused by collisions or errors during transmission and are often discarded by the receiving device.

    Rate this question:

  • 39. 

    •Standard ACLs as close as possible to the source of the traffic denied

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The correct answer is False. This statement is not accurate because standard ACLs are typically applied as close as possible to the destination of the traffic, not the source. Standard ACLs filter traffic based on the source IP address only, so they are more effective when placed closer to the destination. By placing them closer to the source, it may allow unwanted traffic to reach the destination before being filtered out.

    Rate this question:

  • 40. 

    •CRC  errors are generated when the calculated checksum is not the same as the checksum recieved

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    CRC (Cyclic Redundancy Check) errors occur when the calculated checksum, which is a value obtained by performing a mathematical calculation on the data, does not match the checksum received with the data. The purpose of the checksum is to ensure data integrity during transmission. If the calculated checksum and the received checksum do not match, it indicates that the data may have been corrupted or altered during transmission, resulting in a CRC error. Therefore, the given statement is true.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 07, 2017
    Quiz Created by
    Zenaida Agulto
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.