Filters
Question type

Study Flashcards

Access lists to block a router's outward delivery must be applied as ____________________ filters.

Correct Answer

verifed

verified

If you create and apply the lists and they have the intended results, you can cancel the scheduled reload with the ____ command.


A) reload 0
B) reload abort
C) reload cancel
D) reload off

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Traffic coming in to the "man in the router," through any of the interfaces, is considered ____________________.

Correct Answer

verifed

verified

Traffic coming in to "the man in the router," through any of the interfaces, needs to be filtered using ____ traffic filters.


A) outgoing
B) incoming
C) exterior
D) outbound

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

____________________ are permit or deny statements that filter traffic based on the source address, destination address, protocol type, and port number of a packet.

Correct Answer

verifed

verified

Access lists can take the place of more advanced security measures, such as firewalls.

A) True
B) False

Correct Answer

verifed

verified

You must use the ____ command to save the list after configuration if you want it to survive a router reload.


A) copy reload
B) copy start on
C) copy run start
D) copy run reload

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

SDM allows you to easily create a standard or an extended access list or, as it is known in the SDM, a(n) ____.


A) VTY
B) TTY
C) ACL
D) CLI

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

With the ____ command, an administrator can schedule the router to reload in a certain number of minutes, hours, or even days.


A) interval
B) refresh
C) restart
D) reload

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Use the ____ command to remove the application of the list.


A) no accessgroup [ip][list #][direction]
B) no ip [accessgroup][list #][direction]
C) no ip access-list [list #][direction]
D) no ip access-group [list #][direction]

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

When making changes, you must remove the access list, using the ____ command.


A) no access-list [list number]
B) access-list off [list number]
C) off access-list [list number]
D) access-list [list number] no

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Match each item with a statement below:

Premises
determines which bits of the source address are significant
one of the most common problems associated with access lists
the mixing of 0s and 1s in a wildcard mask octet
the default for standard IP access lists
removes an access list
built into the Cisco IOS; solve many problems associated with traffic flow and security
use names instead of numbers to identify themselves
filter by source IP address, destination IP address, protocol type, and application port number
permit or deny packets based only on the source address
Responses
Wildcard mask
no access-list [list #]
Extended IP access lists
Standard IP access lists
Access lists
Named access lists
Lack of planning
Single host wildcard mask
Partial masking

Correct Answer

determines which bits of the source address are significant
one of the most common problems associated with access lists
the mixing of 0s and 1s in a wildcard mask octet
the default for standard IP access lists
removes an access list
built into the Cisco IOS; solve many problems associated with traffic flow and security
use names instead of numbers to identify themselves
filter by source IP address, destination IP address, protocol type, and application port number
permit or deny packets based only on the source address

With careful planning, you can create access lists that control which traffic crosses particular links, and which segments of your network will have access to others.

A) True
B) False

Correct Answer

verifed

verified

Access lists begin working the second they are applied to an interface.

A) True
B) False

Correct Answer

verifed

verified

It is possible to replace the 0.0.0.0 255.255.255.255 entry, which represents all hosts and all networks, with the ____ keyword.


A) all
B) any
C) each
D) none

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Where should you place standard and extended IP access lists?

Correct Answer

verifed

verified

Once an extended IP access list is creat...

View Answer

Unlike the CLI, the SDM does allow a router to be configured as a firewall. To begin this task, click the ____ icon in the Tasks panel.


A) Firewall and ACL
B) Security Audit
C) Routing
D) NAT

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Describe each element of the extended IP access list configuration syntax.

Correct Answer

verifed

verified

To configure extended IP access lists, y...

View Answer

Why should you use a text editor to create access lists?

Correct Answer

verifed

verified

To ease the administrative load associat...

View Answer

Routers use ____ to determine which bits in an address will be significant.


A) wildcard masks
B) access masks
C) list numbers
D) address rules

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 42

Related Exams

Show Answer