What is considered a best practice when configuring ACLs on vty lines?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is considered a best practice when configuring ACLs on vty lines? Use only extended access lists. Place identical restrictions on all vty lines. Apply the ip access-group command inbound.…

Continue ReadingWhat is considered a best practice when configuring ACLs on vty lines?

Refer to the exhibit. An administrator has configured a standard ACL on R1 and applied it to interface serial 0/0/0 in the outbound direction. What happens to traffic leaving interface serial 0/0/0 that does not match the configured ACL statements?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. An administrator has configured a standard ACL on R1 and applied it to interface serial 0/0/0 in the outbound direction. What happens to traffic leaving interface…

Continue ReadingRefer to the exhibit. An administrator has configured a standard ACL on R1 and applied it to interface serial 0/0/0 in the outbound direction. What happens to traffic leaving interface serial 0/0/0 that does not match the configured ACL statements?

Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack? DNS ICMP HTTP or HTTPS DHCP Answers Explanation & Hints: A cybercriminal…

Continue ReadingWhich protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack?

In which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

In which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections? reset attack port scan attack SYN flood attack session hijacking attack Answers Explanation…

Continue ReadingIn which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections?

Consider the following access list.access-list 100 permit ip host 192.168.10.1 any Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address 192.168.10.254 assigned? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Consider the following access list.access-list 100 permit ip host 192.168.10.1 any access-list 100 deny icmp 192.168.10.0 0.0.0.255 any echo access-list 100 permit ip any any Which two actions are taken…

Continue ReadingConsider the following access list.access-list 100 permit ip host 192.168.10.1 any Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address 192.168.10.254 assigned? (Choose two.)

Refer to the exhibit. The named ACL “Managers” already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Refer to the exhibit. The named ACL "Managers" already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit? The…

Continue ReadingRefer to the exhibit. The named ACL “Managers” already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?

Which ACE will permit a packet that originates from any network and is destined for a web server at 192.168.1.1?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which ACE will permit a packet that originates from any network and is destined for a web server at 192.168.1.1? access-list 101 permit tcp host 192.168.1.1 any eq 80 access-list…

Continue ReadingWhich ACE will permit a packet that originates from any network and is destined for a web server at 192.168.1.1?

What does the CLI prompt change to after entering the command ip access-list standard aaa from global configuration mode?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What does the CLI prompt change to after entering the command ip access-list standard aaa from global configuration mode? Router(config)# Router(config-if)# Router(config-router)# Router(config-std-nacl)# Router(config-line)# For more question and answers: Click…

Continue ReadingWhat does the CLI prompt change to after entering the command ip access-list standard aaa from global configuration mode?

Refer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached to R1?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached…

Continue ReadingRefer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached to R1?

A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main…

Continue ReadingA network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)

Refer to the exhibit. A network administrator has configured ACL 9 as shown. Users on the 172.31.1.0 /24 network cannot forward traffic through router CiscoVille. What is the most likely cause of the traffic failure?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. A network administrator has configured ACL 9 as shown. Users on the 172.31.1.0 /24 network cannot forward traffic through router CiscoVille. What is the most likely…

Continue ReadingRefer to the exhibit. A network administrator has configured ACL 9 as shown. Users on the 172.31.1.0 /24 network cannot forward traffic through router CiscoVille. What is the most likely cause of the traffic failure?

What type of ACL offers greater flexibility and control over network access?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What type of ACL offers greater flexibility and control over network access? flexible named standard extended numbered standard Answers Explanation & Hints: The two types of ACLs are standard and…

Continue ReadingWhat type of ACL offers greater flexibility and control over network access?

Which statement describes a difference between the operation of inbound and outbound ACLs?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which statement describes a difference between the operation of inbound and outbound ACLs? In contrast to outbound ALCs, inbound ACLs can be used to filter packets with multiple criteria. Inbound…

Continue ReadingWhich statement describes a difference between the operation of inbound and outbound ACLs?

Which two packet filters could a network administrator use on an IPv4 extended ACL? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two packet filters could a network administrator use on an IPv4 extended ACL? (Choose two.) destination MAC address ICMP message type computer type source TCP hello address destination UDP…

Continue ReadingWhich two packet filters could a network administrator use on an IPv4 extended ACL? (Choose two.)

Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.) most host all any some gt…

Continue ReadingWhich two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)

What wild card mask will match networks 172.16.0.0 through 172.19.0.0?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What wild card mask will match networks 172.16.0.0 through 172.19.0.0? 0.0.3.255 0.0.255.255 0.252.255.255 0.3.255.255 Answers Explanation & Hints: The subnets 172.16.0.0 through 172.19.0.0 all share the same 14 high level…

Continue ReadingWhat wild card mask will match networks 172.16.0.0 through 172.19.0.0?

If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it? DH a private key a digital certificate a different public key Answers Explanation…

Continue ReadingIf an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​ confidentiality authentication integrity nonrepudiation Answers Explanation & Hints: Integrity is ensured by implementing…

Continue ReadingWhich requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​