CCNA 2 Chap 9

Is this your test? Login to manage it. If not, you can make an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Consider the following access list that allows IP phone configuration file transfers from a particular host to a TFTP server:

R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000
R1(config)# access-list 105 deny ip any any
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out

Which method would allow the network administrator to modify the ACL and include FTP transfers from any source IP address?
2.
1 point
Refer to the exhibit. What is the result of adding the established argument to the end of the ACE?
3.
1 point
What two functions describe uses of an access control list? (Choose two.)
4.
1 point
Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?
5.
1 point
What is a limitation when utilizing both IPv4 and IPv6 ACLs on a router?
6.
1 point
Which statement describes a difference between the operation of inbound and outbound ACLs?
7.
1 point
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

Why is the ACL not working?
8.
1 point
Refer to the exhibit. What will happen to the access list 10 ACEs if the router is rebooted before any other commands are implemented?
9.
1 point
Refer to the exhibit. The IPv6 access list LIMITED_ACCESS is applied on the S0/0/0 interface of R1 in the inbound direction. Which IPv6 packets from the ISP will be dropped by the ACL on R1?
10.
1 point
Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)
11.
1 point
What method is used to apply an IPv6 ACL to a router interface?
12.
1 point
Which two characteristics are shared by both standard and extended ACLs? (Choose two.)
13.
1 point
Which three implicit access control entries are automatically added to the end of an IPv6 ACL? (Choose three.)
14.
1 point
In which configuration would an outbound ACL placement be preferred over an inbound ACL placement?
15.
1 point
A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)
16.
1 point
Which feature is unique to IPv6 ACLs when compared to those of IPv4 ACLs?
17.
1 point
What is the only type of ACL available for IPv6?
18.
1 point
An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?
19.
1 point
Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)
20.
1 point
What single access list statement matches all of the following networks?
192.168.16.0
192.168.17.0
192.168.18.0
192.168.19.0
21.
1 point
If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?
22.
1 point
Which IPv6 ACL command entry will permit traffic from any host to an SMTP server on network 2001:DB8:10:10::/64?
23.
1 point
Match each statement with the example subnet and wildcard that it describes. (Not all options are used.)

hosts in a subnet 192.168.15.65 255.255.255.240
all IP 192.168.15.144 0.0.0.15
first valid host 192.168.15.12
subnetwork 192.168.5.0 0.0.3.255
addresses 192.168.3.64 0.0.0.7
192.168.100.63 255.255.255.192
24.
1 point
Which three statements describe ACL processing of packets? (Choose three.)
25.
1 point
What packets would match the access control list statement that is shown below?

access-list 110 permit tcp 172.16.0.0 0.0.0.255 any eq 22