CCNA2 v6.0 Chapter 7 Exam Full 2017 100%
1. QuestionIn which configuration would an outbound ACL placement be preferred over an inbound ACL placement?
Which address is required in the command syntax of a standard ACL?
3. QuestionWhich statement describes a difference between the operation of inbound and outbound ACLs?
4. QuestionWhich three statements describe ACL processing of packets? (Choose three.)
What single access list statement matches all of the following networks?
6. QuestionA network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)
If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?
8. QuestionWhich three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)
Refer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached to R1?
Refer to the exhibit. If the network administrator created a standard ACL that allows only devices that connect to the R2 G0/0 network access to the devices on the R1 G0/1 interface, how should the ACL be applied?
Refer to the following output. What is the significance of the 4 match(es) statement?
R1# <output omitted>
10 permit 192.168.1.56 0.0.0.7
20 permit 192.168.1.64 0.0.0.63 (4 match(es))
30 deny any (8 match(es))
12. QuestionOn which router should the show access-lists command be executed?
13. QuestionWhat is the quickest way to remove a single ACE from a named ACL?
14. QuestionWhich feature will require the use of a named standard ACL rather than a numbered standard ACL?
15. QuestionAn administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?
16. QuestionWhich type of router connection can be secured by the access-class command?
Consider the following output for an ACL that has been applied to a router via the access-class in command. What can a network administrator determine from the output that is shown?
R1# <output omitted>
Standard IP access list 2
10 permit 192.168.10.0, wildcard bits 0.0.0.255 (2 matches)
20 deny any (1 matc
Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?
Refer to the exhibit. An ACL was configured on R1 with the intention of denying traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0/24. All other traffic into subnet 172.16.3.0/24 should be permitted. This standard ACL was then applied outbound on interface Fa0/0. Which conclusion can be drawn from this configuration?
Refer to the exhibit. What will happen to the access list 10 ACEs if the router is rebooted before any other commands are implemented?
What is the effect of configuring an ACL with only ACEs that deny traffic?
22. QuestionWhich type of ACL statements are commonly reordered by the Cisco IOS as the first ACEs?
23. QuestionA network administrator is configuring an ACL to restrict access to certain servers in the data center. The intent is to apply the ACL to the interface connected to the data center LAN. What happens if the ACL is incorrectly applied to an interface in the inbound direction instead of the outbound direction?
24. QuestionWhen would a network administrator use the clear access-list counters command?
Match each statement with the example subnet and wildcard that it describes. (Not all options are used.)