ССNA guide

Page 318

Cisco 640-802: Practice Exam conditions as the source address, the destination address, port numbers and so on. The steps to establish the Access Control List (ACL) are as follows: Step 1: Set parameters for this access list test statement (which can be one of several statements). Router(config)#access-list access-list-number {permit | deny} {test conditions} Step 2: Enable an interface to use the specified access list. Router(config-if)#{protocol} access-group access-list-number {in | out} Standard IP lists (1-99) Extended IP lists (100-199)

m

QUESTION NO: 397

.co

Which IP address and wildcard mask would you use in your ACL to block all the hosts in the subnet 192.168.16.43/28?

lTe

sts

A. 192.168.16.43 0.0.0.212 B. 192.168.16.32 0.0.0.15 C. 192.168.16.32 0.0.0.16 D. 192.168.16.0 0.0.0.31 Answer: B

tua

Explanation: Since there are 28 bits in the subnet mask, we can find the inverse mask by reversing the 1's and 0's.

Ac

/28 = 11111111.11111111.11111111.11110000 /28 Inverse = 00000000.00000000.00000000.00001111 = 192.168.16.32/15 The address 192.168.16.32 and the wildcard mask 0.0.0.15 is the correct answer as shown. This will match all addresses in the 192.168.16.32-192.168.16.47 range.

QUESTION NO: 398 An access list has been designed to prevent HTTP traffic from the Accounting Department from reaching the HR server attached to the Holyoke router. Which of the following access lists will accomplish this task when grouped with the e0 interface on the Chicopee router? Exhibit: "Pass Any Exam. Any Time." - www.actualtests.com

318


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.