CCNA4 v6.0 Chapter 4 Exam Full 100%
1. QuestionWhich range represents all the IP addresses that are affected when network 10.120.160.0 with a wildcard mask of 0.0.7.255 is used in an ACE?
2. QuestionWhat two functions describe uses of an access control list? (Choose two.)
3. QuestionWhich two statements describe the effect of the access control list wildcard mask 0.0.0.15? (Choose two.)
Refer to the exhibit. A network administrator is configuring an ACL to limit the connection to R1 vty lines to only the IT group workstations in the network 192.168.22.0/28. The administrator verifies the successful Telnet connections from a workstation with IP 192.168.22.5 to R1 before the ACL is applied. However, after the ACL is applied to the interface Fa0/0, Telnet connections are denied. What is the cause of the connection failure?
Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)
6. QuestionA network administrator is designing an ACL. The networks 192.168.1.0/25, 192.168.0.0/25, 192.168.0.128/25, 192.168.1.128/26, and 192.168.1.192/26 are affected by the ACL. Which wildcard mask, if any, is the most efficient to use when specifying all of these networks in a single ACL permit entry?
Refer to the exhibit. A network administrator wants to permit only host 192.168.1.1 /24 to be able to access the server 192.168.2.1 /24. Which three commands will achieve this using best ACL placement practices? (Choose three.)
8. QuestionWhich two statements are correct about extended ACLs? (Choose two)
9. QuestionWhich three values or sets of values are included when creating an extended access control list entry? (Choose three.)
Refer to the exhibit. This ACL is applied on traffic outbound from the router on the interface that directly connects to the 10.0.70.5 server. A request for information from a secure web page is sent from host 10.0.55.23 and is destined for the 10.0.70.5 server. Which line of the access list will cause the router to take action (forward the packet onward or drop the packet)?
11. QuestionWhich set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet?
12. QuestionWhich two packet filters could a network administrator use on an IPv4 extended ACL? (Choose two.)
13. QuestionWhich two ACE commands will block traffic that is destined for a web server which is listening to default ports? (Choose two.)
14. QuestionWhich feature is unique to IPv6 ACLs when compared to those of IPv4 ACLs?
15. QuestionWhat two ACEs could be used to deny IP traffic from a single source host 10.1.1.1 to the 192.168.0.0/16 network? (Choose two.)
Refer to the exhibit. The IPv6 access list LIMITED_ACCESS is applied on the S0/0/0 interface of R1 in the inbound direction. Which IPv6 packets from the ISP will be dropped by the ACL on R1?
17. QuestionWhich command is used to activate an IPv6 ACL named ENG_ACL on an interface so that the router filters traffic prior to accessing the routing table?
18. QuestionWhich IPv6 ACL command entry will permit traffic from any host to an SMTP server on network 2001:DB8:10:10::/64?
19. QuestionIn applying an ACL to a router interface, which traffic is designated as outbound?
Fill in the blanks. Use dotted decimal format.
The wildcard mask that is associated with the network 192.168.12.0/24 is 0.0.0.255
An access list has been applied to a router LAN interface in the inbound direction. The IP address of the LAN segment is 192.168.83.64/26. The entire ACL appears below:
access-list 101 deny tcp 192.168.83.64 0.0.0.63 any eq 23
access-list 101 permit ip 192.168.83.64 0.0.0.63 192.168.83.128 0.0.0.63
Drag the descriptions of the packets on the left to the action that the router will perform on the right.
Match each statement with the example subnet and wildcard that it describes. (Not all options are used.)