Quiz On ACL And Switch

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Zenaida Agulto
Z
Zenaida Agulto
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,019
| Attempts: 396 | Questions: 40
Please wait...
Question 1 / 40
0 %
0/100
Score 0/100
1. When making changes, you must remove the access list, using the _______command

Explanation

The correct answer is "no access – list [ list number]". This command is used to remove an access list from the configuration. By using the "no" keyword followed by "access-list" and the list number, the access list is deleted and the changes are implemented. The other options provided in the question do not represent valid commands in Cisco IOS.

Submit
Please wait...
About This Quiz
Quiz On ACL And Switch - Quiz

The following quiz will be our FINAL quiz no. 2 on Computer Networks you are only allowed to answer the following questions within an hour. You are required... see moreto fill in all the necessary information asked upon registration. You are only allowed to answer the quiz ONCE, The system will automatically detect duplicate response from the user. . DEADLINE OF COMPLETION is until Oct. 11, 2017 only GOOD luck and Enjoy the EXAM. . . -Engr. Ronnel Agulto see less

2. •When auto-MDIX is enabled, the interface automatically detects and configures the connection appropriately

Explanation

When auto-MDIX is enabled on a network interface, it allows the interface to automatically detect the type of cable being used (straight-through or crossover) and configure the connection appropriately. This means that regardless of the cable being used, the interface will adjust the transmit and receive pairs accordingly, eliminating the need for manual configuration or the use of a crossover cable. Therefore, the given statement is true.

Submit
3. •An Access list number range of 100 – 199 and 2000 – 2699 is used with it.

Explanation

The given information states that an access list number range of 100-199 and 2000-2699 is used with it. This indicates that the access list being referred to is an extended access control list (ACL). Extended ACLs allow for more granular control over network traffic by filtering based on source and destination IP addresses, protocols, port numbers, and other criteria. Standard ACLs, on the other hand, only filter based on source IP address. Therefore, the correct answer is Extended ACL.

Submit
4. •CISCO IOS command to enter global configuration mode

Explanation

The correct answer is "configure terminal" because it is the CISCO IOS command used to enter global configuration mode. This mode allows the user to configure various settings and parameters for the device. The other commands mentioned in the question, such as "ip address" and "no shutdown," are used to configure specific settings within global configuration mode, but "configure terminal" is the initial command to access this mode.

Submit
5. If managing the switch from a remote network, a default gateway must also be configured

Explanation

When managing a switch from a remote network, a default gateway must be configured. A default gateway is the IP address of the router that connects the switch to other networks. It allows the switch to send and receive data to and from devices on different networks. Without a default gateway, the switch would not be able to communicate with devices outside of its local network. Therefore, it is necessary to configure a default gateway when managing a switch remotely.

Submit
6. •Each ACL must have a unique identification number assigned to it.

Explanation

Each Access Control List (ACL) is a set of rules that determine what traffic is allowed or denied on a network. To ensure proper management and identification, each ACL must have a unique identification number assigned to it. This allows administrators to easily identify and reference specific ACLs when configuring and troubleshooting network security. Therefore, the statement is true.

Submit
7. •CRC  errors are generated when the calculated checksum is not the same as the checksum recieved

Explanation

CRC (Cyclic Redundancy Check) errors occur when the calculated checksum, which is a value obtained by performing a mathematical calculation on the data, does not match the checksum received with the data. The purpose of the checksum is to ensure data integrity during transmission. If the calculated checksum and the received checksum do not match, it indicates that the data may have been corrupted or altered during transmission, resulting in a CRC error. Therefore, the given statement is true.

Submit
8. This are lists of conditions used to test network traffic that tries to travel across a router interface. 

Explanation

Access Control Lists (ACLs) are used to control and filter network traffic based on specified conditions. In the context of the given question, ACLs can be used to test network traffic attempting to pass through a router interface. ACLs can be configured to allow or deny traffic based on various criteria such as source/destination IP addresses, protocols, ports, etc. Therefore, ACLs are a suitable choice for testing network traffic attempting to traverse a router interface.

Submit
9. To remove a standard ACL which command is to be used?

Explanation

The correct answer is "Router(config)#no access-list access-list-number." This command is used to remove a standard ACL from the router's configuration. By entering this command in the global configuration mode, followed by the specific access-list number, the router will remove the specified access-list from its configuration.

Submit
10. ACL lists tell the router what types of packets to accept or deny.

Explanation

ACL (Access Control List) lists are used to control network traffic by specifying what types of packets should be allowed or denied by a router. They can be configured to permit or deny packets based on various criteria such as source/destination IP address, protocol, port number, etc. By defining rules in an ACL list, the router can determine which packets should be accepted and forwarded and which should be rejected. Therefore, the statement "ACL lists tell the router what types of packets to accept or deny" is true.

Submit
11. PoE stands for?

Explanation

Power over Ethernet (PoE) refers to a technology that allows the transmission of both power and data over an Ethernet cable. This eliminates the need for separate power cables, making it more convenient and cost-effective for devices such as IP cameras, wireless access points, and VoIP phones. Therefore, the correct answer is "Power over Ethernet."

Submit
12. •The boot loader can also be used to manage the switch if the IOS can't be loaded

Explanation

The boot loader is a small program that runs when a device is powered on and is responsible for loading the operating system. In some cases, the IOS (Internetwork Operating System) may fail to load properly, preventing the switch from functioning. In such situations, the boot loader can be used to manage the switch and troubleshoot the issue. Therefore, the statement that the boot loader can be used to manage the switch if the IOS can't be loaded is true.

Submit
13. The _______command links an existing standard ACL to an interface: 

Explanation

The correct answer is "ip access-group". This command is used to link an existing standard ACL (Access Control List) to an interface. By applying the ACL to an interface, the specified access restrictions defined in the ACL will be enforced on the traffic passing through that interface.

Submit
14. •Types of communication where it can send and receive data simultaneously

Explanation

Full Duplex is the correct answer because it refers to a type of communication where data can be sent and received simultaneously. In Full Duplex communication, both parties can transmit and receive data at the same time, allowing for faster and more efficient communication. This is in contrast to Half Duplex communication, where data can only be sent or received at a time, and Serial and Parallel communication, which do not necessarily involve simultaneous sending and receiving of data.

Submit
15. ________Masking for IP address bits uses the number 1 and the number 0 to identify how to treat the corresponding IP address bits.

Explanation

The given correct answer is "Wildcard." In IP address masking, a wildcard is used to identify how to treat the corresponding IP address bits. The wildcard consists of 1s and 0s, where the 1s indicate the bits that should be matched exactly, and the 0s indicate the bits that can be ignored or treated as don't care. This allows for more flexible and granular control over network traffic and access control.

Submit
16. •It is an architectural structure that exists between the user and the outside world to protect the internal network from intruders

Explanation

A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders. It acts as a barrier, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By filtering and blocking unauthorized access attempts, a firewall helps to prevent malicious attacks and maintain the security and integrity of the internal network.

Submit
17. CISCO IOS command to return to the privileged EXEC mode.

Explanation

The "end" command is used to return to the privileged EXEC mode in Cisco IOS. When entered, this command allows the user to exit the current configuration mode and return to the privileged mode, where they have access to all the commands and features available to the administrator.

Submit
18. CISCO IOS command to save the running config to start up config

Explanation

The correct answer is "copy run start". This command is used in Cisco IOS to save the running configuration to the startup configuration. The "copy" command is used to copy files, and in this case, it is used to copy the running configuration (run) to the startup configuration (start). This ensures that any changes made to the running configuration are saved and will persist after a reboot.

Submit
19. This feature is used to automatic detect cable type

Explanation

The correct answer is "mdix auto" because this feature is used to automatically detect the type of cable being used. By setting it to "auto," the device will determine whether the cable is a straight-through or crossover cable and adjust accordingly. This ensures the proper communication between devices without the need for manual cable configuration.

Submit
20. •Which of the following ACL command is used to display the access-lists configuration

Explanation

The correct answer is "Show access-lists". This command is used to display the configuration of access lists on a network device. By using this command, network administrators can view the access control entries (ACEs) and their associated parameters, such as source and destination IP addresses, protocols, and port numbers. This information is crucial for troubleshooting network connectivity issues and verifying the effectiveness of the access control policies in place.

Submit
21. It is a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire.

Explanation

A VLAN (Virtual Local Area Network) is a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire. VLANs provide a way to segment a network without physically separating the devices. By creating virtual networks, VLANs allow for better network management, improved security, and more efficient use of network resources.

Submit
22. This VLAN number is the CISCO default.

Explanation

not-available-via-ai

Submit
23. This VLAN number is the cisco Default for FDDI and Token Ring

Explanation

The VLAN numbers 1002-1005 are the Cisco default VLANs for FDDI (Fiber Distributed Data Interface) and Token Ring. These VLANs are reserved for these specific network technologies and are used for management and control purposes. VLANs 2-1001 and 1006-4094 are user-defined VLANs, while VLANs 0 and 4095 are reserved VLANs with special meanings.

Submit
24. The ______option substitutes 0.0.0.0 for the mask. This mask requires that all bits of the ACL address and the packet address match. This option will match just one address. 

Explanation

The "host" option substitutes 0.0.0.0 for the mask. This means that all bits of the ACL address and the packet address need to match in order for the option to be valid. This option will only match one specific address, rather than a range of addresses.

Submit
25. The_____option substitutes 0.0.0.0 for the IP address and 255.255.255.255 for the wildcard mask. This option will match any address that it is compared against. 

Explanation

The "any" option substitutes 0.0.0.0 for the IP address and 255.255.255.255 for the wildcard mask. This means that it will match any address that it is compared against, making it a universal match.

Submit
26. •Each port on Cisco Catalyst switches have status LED indicator lights and one of this is the RPS LED. RPS stands for?

Explanation

The RPS LED on Cisco Catalyst switches stands for Redundant Power System. This LED indicates the status of the redundant power system, which provides backup power in case the primary power source fails.

Submit
27. •The following are VLAN parameter when you create VLAN except for one which is?

Explanation

The VLAN mode is not a parameter when creating a VLAN. VLAN mode refers to the different ways in which VLANs can be configured, such as access mode or trunk mode, but it is not a specific parameter that is set when creating a VLAN.

Submit
28. ACL  unique identification number 600 falls under what protocol?

Explanation

The correct answer is Apple Talk because ACL unique identification number 600 is associated with Apple Talk protocol.

Submit
29. •A _____ in a bit position of the access list mask indicates the corresponding bit in the address is not "interesting" and can be ignored.

Explanation

In an access list mask, a "one" in a bit position indicates that the corresponding bit in the address is not "interesting" and can be ignored. This means that the access list will not consider or match any addresses that have a "one" in that particular bit position.

Submit
30. Which of the following ACL command is used to display the configuration output, including access-lists and assignments

Explanation

The correct answer is "Show running-config" because this command is used to display the complete configuration of a device, including access-lists and assignments. It shows the current running configuration of the device, which includes all the commands and settings that have been applied. This command is commonly used to troubleshoot and verify the configuration of a device.

Submit
31. Runts are packets that are discarded because they exceed the maximum packet size for medium 

Explanation

The given statement is false. Runts are not discarded packets that exceed the maximum packet size for medium. In fact, runts are undersized packets that are smaller than the minimum packet size required. These undersized packets are typically caused by collisions or errors during transmission and are often discarded by the receiving device.

Submit
32. Which of the following ACL command is used to display the access-lists interface assignments

Explanation

The correct answer is "Show ip interface". This command is used to display the access-lists interface assignments. It shows the access control lists (ACLs) that are applied to specific interfaces on a device. By using this command, network administrators can quickly view the ACLs that are configured on each interface, allowing them to verify the access control policies in place and troubleshoot any connectivity issues that may be related to ACL configurations.

Submit
33. An ACL containing numbered ACL statements can be altered

Explanation

An ACL (Access Control List) containing numbered ACL statements cannot be altered. Numbered ACL statements are fixed and cannot be modified once they are created. To make changes to an ACL, it needs to be completely replaced with a new ACL that includes the desired alterations. Therefore, the given statement is false.

Submit
34. •Standard ACLs as close as possible to the source of the traffic denied

Explanation

The correct answer is False. This statement is not accurate because standard ACLs are typically applied as close as possible to the destination of the traffic, not the source. Standard ACLs filter traffic based on the source IP address only, so they are more effective when placed closer to the destination. By placing them closer to the source, it may allow unwanted traffic to reach the destination before being filtered out.

Submit
35. Which of the following bit will presume an Even Parity bit

Explanation

The given bit sequence has an even number of 1s. In even parity, an additional bit is added to the sequence to make the total number of 1s even. This is done to detect errors in transmission. In this case, the sequence 010101100011 already has an even number of 1s, so it would presume an Even Parity bit.

Submit
36. VLAN 0 is used for?

Explanation

VLAN 0 is used for system used only. This means that VLAN 0 is reserved for internal use within the networking system and cannot be assigned to any specific network or device. It is typically used for administrative purposes or for special system functions that do not require communication with external networks or devices.

Submit
37. An ACL containing numbered ACL statements can be altered

Explanation

An ACL (Access Control List) is a set of rules that determines the access permissions for a network device or system. Numbered ACL statements refer to the specific rules within the ACL that are identified by numbers. These statements define what traffic is allowed or denied based on various criteria such as source/destination IP addresses, protocols, or ports. The ability to alter an ACL means that the administrator can modify or change these rules as needed, allowing for flexibility in managing network security and access control. Therefore, the statement "An ACL containing numbered ACL statements can be altered" is true.

Submit
38. If the byte of data to be sent is 10011010 what should be the data word that should be received using Hamming Code Detection?

Explanation

The given byte of data, 10011010, should be received as 011100101010 using Hamming Code Detection.

Submit
39. •Types of communication where it can send or receive data at a time

Explanation

Half Duplex communication refers to a type of communication where data can be sent or received, but not simultaneously. In this mode, communication can happen in both directions, but only one direction at a time. It is like a walkie-talkie where one person can speak while the other person listens, and then they switch roles. This is different from Full Duplex communication where data can be sent and received simultaneously, like in a telephone conversation. Therefore, the correct answer in this case is Half Duplex.

Submit
40. A ______in a bit position of the access list mask indicates that the corresponding bit in the address must be checked;

Explanation

A "X" in a bit position of the access list mask indicates that the corresponding bit in the address must be checked. This means that the access list is specifying a specific value for that bit position in order for the address to be allowed or denied.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 15, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 07, 2017
    Quiz Created by
    Zenaida Agulto
Cancel
  • All
    All (40)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
When making changes, you must remove the access list, using the...
•When auto-MDIX is enabled, the interface automatically detects...
•An Access list number range of 100 – 199 and 2000 –...
•CISCO IOS command to enter global configuration mode
If managing the switch from a remote network, a default gateway must...
•Each ACL must have a unique identification number assigned to...
•CRC  errors are generated when the calculated checksum is...
This are lists of conditions used to test network traffic that tries...
To remove a standard ACL which command is to be used?
ACL lists tell the router what types of packets to accept or deny.
PoE stands for?
•The boot loader can also be used to manage the switch if the IOS...
The _______command links an existing standard ACL to an...
•Types of communication where it can send and receive data...
________Masking for IP address bits uses the number 1 and the number 0...
•It is an architectural structure that exists between the user...
CISCO IOS command to return to the privileged EXEC mode.
CISCO IOS command to save the running config to start up config
This feature is used to automatic detect cable type
•Which of the following ACL command is used to display the...
It is a group of devices on one or more LANs that are configured to...
This VLAN number is the CISCO default.
This VLAN number is the cisco Default for FDDI and Token Ring
The ______option substitutes 0.0.0.0 for the mask. This mask requires...
The_____option substitutes 0.0.0.0 for the IP address and...
•Each port on Cisco Catalyst switches have status LED indicator...
•The following are VLAN parameter when you create VLAN except for...
ACL  unique identification number 600 falls under what protocol?
•A _____ in a bit position of the access list mask indicates the...
Which of the following ACL command is used to display the...
Runts are packets that are discarded because they exceed the maximum...
Which of the following ACL command is used to display the access-lists...
An ACL containing numbered ACL statements can be altered
•Standard ACLs as close as possible to the source of the traffic...
Which of the following bit will presume an Even Parity bit
VLAN 0 is used for?
An ACL containing numbered ACL statements can be altered
If the byte of data to be sent is 10011010 what should be the...
•Types of communication where it can send or receive data at a...
A ______in a bit position of the access list mask indicates that the...
Alert!

Advertisement