-
MV Utopia may conduct the following operations to stop listing except to().
A . jettison cargo
B . immobilize the engine
C . transfer cargo
D . transfer bunker
-
Which of the following commands would successfully implement an access list on a routers virtual terminal line?()
A . RouterTK(config-line)# access-class 10 in
B . RouterTK(config-if)# ip access-class 23 out
C . RouterTK(config-line)# access-list 150 in
D . RouterTK(config-if)# ip access-list 128 out
E . RouterTK(config-line)# access-group 15 out
F . RouterTK(config-if)# ip access-group 110 i
-
The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.0 0.0.0.255 any What is the effect of this access list configuration?()
A . permit all packets matching the first three octets of the source address to all destinations
B . permit all packet matching the last octet of the destination address and accept all source addresses
C . permit all packet matching the host bits in the source address to all destinations
D . permit all packet from the third subnet of the network address to all destinatio
-
The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN:
https://assets.asklib.com/images/image2/2018073010294287195.jpg
How will the above access lists affect traffic?()
A . FTP traffic from 192.169.1.22 will be denied.
B . No traffic, except for FTP traffic will be allowed to exit E0.
C . FTP traffic from 192.169.1.9 to any host will be denied.
D . All traffic exiting E0 will be denied.
E . All FTP traffic to network 192.169.1.9/29 will be denied.
-
Which of these is true regarding the configuration and application of port access control lists? ()
A . PACLs can be applied in the inbound or outbound direction of a Layer 2 physical interface.
B . At Layer 2, a MAC address PACL will take precedence over any existing Layer 3 PACL.
C . When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port.
D . PACLs are not supported on EtherChannel interfaces.
-
You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()
A . show access-list
B . show ip access-list
C . show ip interface
D . show interface
E . show interface list
-
Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()
A . /var/rmc/ctrmc.acls
B . /etc/ctrmc/rsct.acls
C . /etc/security/rsct.acls
D . /usr/sbin/rsct/cfg/ctrmc.acl
-
Which command is used to display the placement and direction of an IP access control list on a router?()
A . show access-list
B . show ip route
C . show ip interface
D . show interface
E . show interface list
F . show ip interface brief
-
What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。
A . permit all packets matching the first three octets of the source address to all destinations
B . permit all packets matching the last octet of the destination address and accept all source addresses
C . permit all packets from the third subnet of the network address to all destinations
D . permit all packets matching the host bits in the source address to all destinations
E . permit all packets to destinations matching the first three octets in the destination addre
-
Which of the following are benefits provided with access control lists (ACLs)?()
A . ACLs monitor the number of bytes and packets.
B . Virus detection.
C . ACLs dentify interesting traffic for DDR.
D . ACLs provide IP route filtering.
E . ACLs provide high network availability.
F . ACLs classify and organize network traffic.
-
Which of the following are characteristics of named access lists?()
A . Individual statements in a named access list may be deleted.
B . They require a numbered range from 1000 to 1099.
C . When created, they must be specified as standard or extended.
D . They are created with the ip access-list command.
E . The entire access list must be deleted before editing.
F . They are applied with the ip name-group command.
-
A network administrator has configured access list 172 to prevent Telnet and ICMP traffic from reaching a server with the address if 192.168.13.26. Which command can the administrator issue to verify that the access list is working properly?()
A . Router# ping 192.168.13.26
B . Router# debug access-list 172
C . Router# show open ports 192.168.13.26
D . Router# show access-list
E . Router# show ip interface
-
Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()
A . show interface list
B . show ip route
C . show ip interface
D . show ip interface brief
E . show interface
-
How will the above access lists affect traffic?()
A . FTP traffic from 192.169.1.22 will be denied
B . No traffic, except for FTP traffic will be allowed to exit E0
C . FTP traffic from 192.169.1.9 to any host will be denied
D . All traffic exiting E0 will be denied
E . All FTP traffic to network 192.169.1.9/29 will be denied
-
Which switching engine enables the access control list lookup to be committed to hardware? ()
A . IETF
B . PFC
C . ASIC
D . TCAM
-
On a newly installed router, the following access list is added to the HSSI interface for incoming traffic:Access-list 101 permit tcp any 10.18.10.0 0.0.0.255 eq tcp What is the effect of the "any" keyword in the above access list?()
A . check any of the bits in the source address
B . permit any wildcard mask for the address
C . accept any source address
D . check any bit in the destination address
E . permit 255.255.255.255 0.0.0.0
F . accept any destinatio
-
What is the effect of the following access list condition? access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。
A . permit all packets matching the first three octets of the source address to all destinations
B . permit all packets matching the last octet of the destination address and accept all source addresses
C . permit all packets from the third subnet of the network address to all destinations
D . permit all packets matching the host bits in the source address to all destinations
E . permit all packets to destinations matching the first three octets in the destination addre
-
Which of the following options lists the steps in PPP session establishment in the correct order?()
A . Optional authentication phase, link establishment phase, network layer protocol phase.
B . Network layer protocol phase, link establishment phase, optional authentication phase.
C . Network layer protocol phase, optional authentication phase, link establishment phase.
D . Link establishment phase, network layer protocol phase, optional authentication phase.
E . Link establishment phase, optional authentication phase, network layer protocol phase.
F . Optional authentication phase, network layer protocol phase, link establishment phase.
-
What are some general guidelines regarding the placement of access control lists?()
A . You should place standard ACLS as close as possible to the source of traffic to be denied.
B . You should place extended ACLS as close as possible to the source of traffic to be denied.
C . You should place standard ACLS as close as possible to the destination of traffic to be denied.
D . You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.
-
Which of the following is the correct command to list the filesystems in datavg?()
A . lsvg -p datavg
B . lsvg -l datavg
C . lsvg -L datavg
D . lsvg -o datavg
-
Which one of the access control list statements below will deny all telnet connections to subnet 10.10.1.0/24?()
A . access-list 15 deny telnet any 10.10.1.0 0.0.0.255 eq 23
B . access-list 115 deny udp any 10.10.1.0 eq telnet
C . access-list 15 deny tcp 10.10.1.0 255.255.255.0 eq telnet
D . access-list 115 deny tcp any 10.10.1.0 0.0.0.255 eq 23
E . access-list 15 deny udp any 10.10.1.0 255.255.255.0 eq 23
-
Which of the following answer choices are correct characteristics of named access list?()
A . You can delete individual statements in a named access list
B . Named access lists require a numbered range from 1000 to 1099.
C . Named access lists must be specified as standard or extended.
D . You can use the ip access-list command to create named access lists.
E . You cannot delete individual statements in a named access list.
F . You can use the ip name-group command to apply named access lists.
-
Among the following economies,__ is not among the list of Asia’s Four Tigers()
A.Thailand
B.Singapore
C.China’s Taiwan
D.China’s Hong Kong