Quiz On ACL And Switch

40 Questions | Attempts: 169
Share

SettingsSettingsSettings
Quiz On ACL And Switch - Quiz

The following quiz will be our FINAL quiz no. 2 on Computer Networks you are only allowed to answer the following questions within an hour. You are required to fill in all the necessary information asked upon registration. You are only allowed to answer the quiz ONCE, The system will automatically detect duplicate response from the user. . DEADLINE OF COMPLETION is until Oct. 11, 2017 only GOOD luck and Enjoy the EXAM. . . -Engr. Ronnel Agulto


Questions and Answers
  • 1. 
    This are lists of conditions used to test network traffic that tries to travel across a router interface. 
    • A. 

      Routing Table

    • B. 

      Access Control List

    • C. 

      VLSM

    • D. 

      None of the choices

  • 2. 
    When making changes, you must remove the access list, using the _______command
    • A. 

      No access – list [ list number]

    • B. 

      Access – list off [ list number]

    • C. 

      Off – access list [ list number]

    • D. 

      Access – list [list number]

  • 3. 
    ACL  unique identification number 600 falls under what protocol?
    • A. 

      Apple Talk

    • B. 

      IPX

    • C. 

      IP

    • D. 

      Extended IP

  • 4. 
    A ______in a bit position of the access list mask indicates that the corresponding bit in the address must be checked;
    • A. 

      Zero

    • B. 

      X

    • C. 

      Allow

    • D. 

      One

  • 5. 
    The ______option substitutes 0.0.0.0 for the mask. This mask requires that all bits of the ACL address and the packet address match. This option will match just one address. 
    • A. 

      Allow

    • B. 

      Permit

    • C. 

      Any

    • D. 

      Host

  • 6. 
    The _______command links an existing standard ACL to an interface: 
    • A. 

      No access-list

    • B. 

      Show ip router

    • C. 

      Ip access-group

    • D. 

      Both A and C

  • 7. 
    •An Access list number range of 100 – 199 and 2000 – 2699 is used with it.
    • A. 

      Standard ACL

    • B. 

      Special ACL

    • C. 

      Extended ACL

    • D. 

      Inferior ACL

  • 8. 
    ________Masking for IP address bits uses the number 1 and the number 0 to identify how to treat the corresponding IP address bits.
    • A. 

      Subnet

    • B. 

      Wildcard

    • C. 

      ACL

    • D. 

      None of the choices

  • 9. 
    If the byte of data to be sent is 10011010 what should be the data word that should be received using Hamming Code Detection?
    • A. 

      011100101010

    • B. 

      111100101010

    • C. 

      011101101010

    • D. 

      011100101011

  • 10. 
    Which of the following bit will presume an Even Parity bit
    • A. 

      010101100011

    • B. 

      110101100011

    • C. 

      010101000011

    • D. 

      011101100011

  • 11. 
    The_____option substitutes 0.0.0.0 for the IP address and 255.255.255.255 for the wildcard mask. This option will match any address that it is compared against. 
    • A. 

      allow

    • B. 

      permit

    • C. 

      Any

    • D. 

      Host

  • 12. 
    •Which of the following ACL command is used to display the access-lists configuration
    • A. 

      Show access-lists

    • B. 

      Show ip interface

    • C. 

      Show running-config

    • D. 

      None of the choices

  • 13. 
    •A _____ in a bit position of the access list mask indicates the corresponding bit in the address is not “interesting” and can be ignored.
    • A. 

      Zero

    • B. 

      X

    • C. 

      Allow

    • D. 

      One

  • 14. 
    •It is an architectural structure that exists between the user and the outside world to protect the internal network from intruders
    • A. 

      Server

    • B. 

      Autonomous System

    • C. 

      Firewall

    • D. 

      ACL

  • 15. 
    Which of the following ACL command is used to display the configuration output, including access-lists and assignments
    • A. 

      Show access-lists

    • B. 

      Show ip interface

    • C. 

      Show running-config

    • D. 

      None of the choices

  • 16. 
    •Each port on Cisco Catalyst switches have status LED indicator lights and one of this is the RPS LED. RPS stands for?
    • A. 

      Recovery Power System

    • B. 

      Redundant Power System

    • C. 

      Recovery Power Supply

    • D. 

      Redundant Power Supply

  • 17. 
    To remove a standard ACL which command is to be used?
    • A. 

      Router>no access-list access-list-number

    • B. 

      Router(config)#no access-list access-list-number

    • C. 

      Router(config-run)#no access-list access-list-number

    • D. 

      None of the choices

  • 18. 
    Which of the following ACL command is used to display the access-lists interface assignments
    • A. 

      Show access-lists

    • B. 

      Show ip interface

    • C. 

      Show running-config

    • D. 

      Show running-config

  • 19. 
    •Types of communication where it can send or receive data at a time
    • A. 

      Half Duplex

    • B. 

      Half Duplex

    • C. 

      Half Duplex

    • D. 

      Full Duplex

  • 20. 
    CISCO IOS command to return to the privileged EXEC mode.
    • A. 

      End

    • B. 

      No shutdown

    • C. 

      Copy run start

    • D. 

      Interface VLAN

  • 21. 
    •Types of communication where it can send and receive data simultaneously
    • A. 

      Half Duplex

    • B. 

      Serial

    • C. 

      Parallel

    • D. 

      Full Duplex

  • 22. 
    It is a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire.
    • A. 

      ACL

    • B. 

      VLAN

    • C. 

      LAN

    • D. 

      INTRANET

  • 23. 
    •CISCO IOS command to enter global configuration mode
    • A. 

      Configure terminal

    • B. 

      Ip address (ip address)

    • C. 

      Ip address (ip address)

    • D. 

      No shutdown

  • 24. 
    VLAN 0 is used for?
    • A. 

      Option 1FDDI and Token ring

    • B. 

      Ethernet VLAN

    • C. 

      Configuring extended VLAN

    • D. 

      System used only

  • 25. 
    CISCO IOS command to save the running config to start up config
    • A. 

      End

    • B. 

      No shutdown

    • C. 

      Copy run start

    • D. 

      Interface VLAN

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.