Computer Networks » Acl
Which of the following can be suited as a definition of an Access List?
A. Set of protocols to define traffic in a router
B. Set of rules used for packet filtering
C. Set of guidelines that every router should follow
D. Set of features that every router contains
Read more about this MCQ
Which of the following set is used to identify Access Lists?
A. Number and name
B. Number and special characters
C. Names and binary numbers
D. Special character and binary numbers
Read more about this MCQ
Which of the following aspects can’t be managed by a standard access list?
A. Allowing a network
B. Denying a sub-network
C. Denying a service
D. Allowing a host
Read more about this MCQ
Which set of things will be taken into account in order to filter the packets in an extended access list?
A. Source ip address and destination ip address
B. Source ip address, protocol and port number
C. Source ip address
D. Source ip address, protocol, port number and destination ip address
Read more about this MCQ
What will happen if an empty access list is assigned to an interface?
A. It will allow all the packets into the network
B. It will deny all the packets from entering the network
C. It will allow only few packets into the network
D. It does nothing
Read more about this MCQ
What is the range of standard access list, if it is numbered?
A. 1 to 99
B. 99 to 199
C. 1 to 99 or 1300 to 1999
D. 99 to 199 or 2000 to 3000
Read more about this MCQ
What is the range of numbered extended access list?
A. 1 to 99 or 1300 to 1999
B. 1 to 99 or 1300 to 2699
C. 100 to 199 or 1999 to 2699
D. 100 to 199 or 2000 to 2699
Read more about this MCQ
Which of the following cannot be an advantage of an access list?
A. It furnishes the security
B. It helps the network to perform well
C. It speeds up the packet transmission
D. It manages the traffic over the network
Read more about this MCQ
What is the main advantage of Port Access Control List?
A. It is implemented on layer 3 devices
B. It supports outbound and inbound traffic
C. It can have 2 access lists on a layer 2 interface
D. It can be configured on ether-channel also
Read more about this MCQ