Access Lists QUESTION
Access Lists QUESTION
Exhibit:
6. The following access list was applied outbound on the E0 interface connected to
the 192.168.1.8/29 LAN:
access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 any
access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 21 any
What effect will this access list have?
A. All traffic will be allowed to exit E0 except FTP traffic.
B. FTP traffic from 192.168.1.22 to any host will be denied.
C. FTP traffic from 192.168.1.9 to any host will be denied.
D. All traffic exiting E0 will be denied.
E. All FTP traffic to network 192.168.1.9/29 from any host will be denied.
7. Which command is used to display the placement and direction of an IP access
control list on a router?
A. show access-list
B. show ip route
C. show ip interface
D. show interface
E. show interface list
10.
Camden#show running-config
<some output text omitted>
enable password cisco
!
username Central password 0 cisco
!
interface BRI0/0
ip address 192.168.0.1 255.255.255.0
encapsulation ppp
dialer idle-timeout 180
dialer map ip 192.168.0.2 name Remote 5552000
dialer-group 1
isdn switch-type basic-ni
no fair-queue
ppp authentication chap
!
ip route 192.168.20.0 255.255.255.0 192.168.0.2
!
router rip
network 192.168.0.0
!
access-list 129 deny tcp 192.168.0.0 0.0.0 255 host 192.168.20.5 eq
www
access-list 128 permit ip any any
dialer-list 1 protocol ip list 128
In an effort to minimize traffic, an administrator decided to keep web traffic from
causing the ISDN link to come up by denying WWW traffic to the 192.168.20.5
remote server. Two minutes after making changes to the configuration as shown in
the graphic, the administrator notices that web traffic is still passing over the link.
What is the most likely cause of the problem?
A. The dialer-group has not been applied to outbound traffic.
B. The access-list is incorrectly configured.
C. Broadcasts are creating "interesting" traffic and keeping the link active.
D. The command ip access-group 128 out is missing from the bri0/0 interface.
1. Answer: F
Explanation:
To enable the ACL on an interface and define the direction of packets to which the ACL
is applied, the ip access-group command is used.
When referring to a router, these terms have the following meanings.
Out - Traffic that has already been through the router and is leaving the interface; the
source would be where it's been (on the other side of the router) and the destination is
where it's going.
In - Traffic that is arriving on the interface and which will go through the router; the
source would be where it's been and the destination is where it's going (on the other side
of the router).
2. Answer: D
Explanation:
By default access list is having implicit deny statement at the end. In this example there is
no permit statement, so it will deny all traffic exiting E0 Interface.
Incorrect answers
A: It will deny FTP and Telnet Traffic
B,C,E: It will deny all traffic in addition to the condition mentioned in the answer.
Because there is no permit statement at the end.
3. Answer: C
4. Answer: C, D, E
Explanation:
IP access control lists (ACLs) cause a router to discard some packets based on criteria
defined by the network engineer. The goal of these filters is to prevent unwanted traffic in
the network whether to prevent hackers from penetrating the network or just to prevent
employees from using systems they should not be using.
IP access lists can also be used to filter routing updates, to match packets for
prioritization, to match packets for prioritization, to match packets for VPN tunneling,
and to match packets for implementing quality of service features.
5. Answer:
TestKing1>enable
Password:
TestKing1#show access-lists
TestKing1#config t
Enter configuration commands, one per line. End with END.
TestKing1(config)#access-list 101 deny tcp any 192.168.149.1 0.0.0.0 eq 23
TestKing1(config)#access-list 101 deny tcp any 192.168.199.1 0.0.0.0 eq 23
TestKing1(config)#access-list 101 permit ip any any
TestKing1(config)#interface Ethernet 0
TestKing1(config-if)#ip access-group 101 in
TestKing1(config-if)#exit
TestKing1(config)#interface serial 0