Question

In: Accounting

List and describe two (2) ACL commands that may be used in responding to Case#2 in...

List and describe two (2) ACL commands that may be used in responding to Case#2 in Chapter 9

Solutions

Expert Solution

two additional uses of ACLs

specifying internal hosts for NAT  

identifying traffic for QoS  

reorganizing traffic into VLANs

filtering VTP packets

Refer to the exhibit. What can be determined from this output.

The ACL is missing the deny ip any any ACE.

Because there are no matches for line 10, the ACL is not working.

The ACL is only monitoring traffic destined for 10.23.77.101 from three specific hosts.

The router has not had any Telnet packets from 10.35.80.22 that are destined for 10.23.77.101.

Refer to the exhibit. A network administrator configures a named ACL on the router. Why is there no output displayed when the show command is issued?

The ACL is not activated.

The ACL name is case sensitive.

The ACL has not been applied to an interface.

No packets have matched the ACL statements yet.

Refer to the exhibit. A network administrator is configuring an ACL to limit the connection to R1 vty lines to only the IT group workstations in the network 192.168.22.0/28. The administrator verifies the successful Telnet connections from a workstation with IP 192.168.22.5 to R1 before the ACL is applied. However, after the ACL is applied to the interface Fa0/0, Telnet connections are denied. What is the cause of the connection failure?

The permit ACE specifies a wrong port number.

The enable secret password is not configured on R1.

The login command has not been entered for vty lines.

The IT group network is included in the deny statement.

The permit ACE should specify protocol ip instead of tcp.

Which series of commands will cause access list 15 to restrict Telnet access on a router?

R1(config)# line vty 0 4

R1(config​-line)# access-class 15 in

R1(config)# line vty 0 4

R1(config​-line)# ip access-group 15 in

R1(config)# int gi0/0

R1(config​-if)# access-class 15 in

R1(config)# int gi0/0

R1(config​-if)# ip access-group 15 in

Which two statements are correct about extended ACLs? (Choose two)

Extended ACLs use a number range from 1-99.

Extended ACLs end with an implicit permit statement.

Extended ACLs evaluate the source and destination addresses.

Answer Port numbers can be used to add greater definition to an ACL.

Refer to the exhibit. This ACL is applied on traffic outbound from the router on the interface that directly connects to the 10.0.70.5 server. A request for information from a secure web page is sent from host 10.0.55.23 and is destined for the 10.0.70.5 server. Which line of the access list will cause the router to take action (forward the packet onward or drop the packet)?

1

2

3

4

5

the deny ip any any that is at the end of every ACL

In applying an ACL to a router interface, which traffic is designated as outbound?

traffic that is coming from the source IP address into the router

traffic that is leaving the router and going toward the destination host

traffic that is going from the destination IP address into the router

traffic for which the router can find no routing table entry

What is the effect of the established parameter in an extended ACL?

blocks all incoming traffic from reaching a network

allows external traffic into a network only if it is part of an existing connection with an internal host

allows external sources to send unsolicited requests for information to source IP addresses in the network

allows traffic from a permitted source address to go to any destination outside the network

Which range represents all the IP addresses that are affected when network 10.120.160.0 with a wildcard mask of 0.0.7.255 is used in an ACE?

10.120.160.0 to 10.127.255.255

10.120.160.0 to 10.120.167.255

10.120.160.0 to 10.120.168.0

10.120.160.0 to 10.120.191.255

Refer to the exhibit. A network administrator wants to create a standard ACL to prevent network 1 traffic from being transmitted to the Research and Development network. On which router interface and in which direction should the standard ACL be applied?

R1 Gi0/0 inbound

R1 Gi0/0 outbound

R1 S0/0/0 outbound

R2 S0/0/0 inbound

R2 Gi0/0 outbound

R2 Gi0/0 inbound

Which command is used to activate an IPv6 ACL named ENG_ACL on an interface so that the router filters traffic prior to accessing the routing table?

ipv6 access-class ENG_ACL in

ipv6 access-class ENG_ACL out

ipv6 traffic-filter ENG_ACL in

ipv6 traffic-filter ENG_ACL out

Which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet?

access-list 103 deny tcp host 192.168.10.0 any eq 23

access-list 103 permit tcp host 192.168.10.1 eq 80

access-list 103 permit 192.168.10.0 0.0.0.255 host 172.17.80.1

access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq telnet​​

access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80

access-list 103 deny tcp ​192.168.10.0 0.0.0.255 any eq 23

access-list 103 permit tcp 192.168.10.0 0.0.0.255 any eq 80

access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23

Refer to the exhibit. A network administrator is configuring a standard IPv4 ACL. What is the effect after the command no access-list 10 is entered?

ACL 10 is disabled on Fa0/1.

ACL 10 is removed from the running configuration.

ACL 10 will be disabled and removed after R1 restarts.

ACL 10 is removed from both the running configuration and the interface Fa0/1.

In the creation of an IPv6 ACL, what is the purpose of the implicit final command entries, permit icmp any any nd-na and permit icmp any any nd-ns?

to allow IPv6 to MAC address resolution

to allow forwarding of IPv6 multicast packets

to allow automatic address configuration

to allow forwarding of ICMPv6 packets


Related Solutions

9) Describe the ACL analysis? How can ACL tools and techniques be used in an audit?...
9) Describe the ACL analysis? How can ACL tools and techniques be used in an audit? Be specific and use examples to support your answer. What did you learn about ACL that you found to be most useful with respect to IT Audit?
List and describe the technologies used in this case study.
List and describe the technologies used in this case study.
describe a project list two task that may be performed in parallel and two tasks that...
describe a project list two task that may be performed in parallel and two tasks that need to be performed sequeooontially
Question 2 A.   List two (2) policies a company may adopt to lessen the risk of...
Question 2 A.   List two (2) policies a company may adopt to lessen the risk of uncollectible accounts and improve its cash flows. B. Joseph Corporation a mobile phone wholesaler sells mobile phones to PhoneTech Ltd, a mobile phone retailer on August 1, 2020 for $500 each, the value of the sale is $50,000, with credit terms of 3/10, n/30. Assume the company uses the net method to record accounts receivables. Required: a. Prepare the journal entry to record the...
Describe some ways that the Emergency Response Guidebook is used when responding to incidents involved the...
Describe some ways that the Emergency Response Guidebook is used when responding to incidents involved the release of hazardous materials.
1.List and describe the four forms of energy used in the human body. 2.Describe the three...
1.List and describe the four forms of energy used in the human body. 2.Describe the three major types of chemical bonds and any subtype they have. Compare and contrast the three. 3.Define homeostasis and describe the parts and functions of the homeostatic control mechanism. 4.Describe the four macromolecules, in detail. Include the elements that build the four molecules, the building blocks, and the major functions of the four. 5.List and describe the structural organization of the human body.
in ACL (access control List) : 1.How do you determine who can access object x? 2....
in ACL (access control List) : 1.How do you determine who can access object x? 2. How do you determine which objects user y can access? 3. What happens if a file is deleted?
2. Explain how the mesg, write, and wall commands can be used to allow users to...
2. Explain how the mesg, write, and wall commands can be used to allow users to talk to each other on UNIX
List five aspects of corporate or organizational culture. Describe two workplace decisions that may be determined...
List five aspects of corporate or organizational culture. Describe two workplace decisions that may be determined by corporate culture. List some questions you could ask about a workplace that would start to give you a sense of its culture. What are five ways that an organization may attempt to instill a culture through social conditioning? In your own experience in a job or any organization, what’s an example of social conditioning that enforced the place’s culture?
List and describe two (2) events that led to America's involvement in WWII.
List and describe two (2) events that led to America's involvement in WWII.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT