IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA 4 v4.0 EWANRefer to the exhibit and the following configuration. The named ACL SURFING should enable only the hosts on the 192.168.10.0 network web and secure web access. The hosts on 192.168.11.0 should not be permitted any access. The BROWSING ACL should permit return access only to traffic that originated from the 192.168.10.0 network. However, the ACLs do not accomplish this. Which changes would correct this problem?ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANRefer to the exhibit and the following configuration. ACL 10, configured on R1, is designed to deny the host at 192.168.10.10 access to the 192.168.11.0 network, but all other hosts on the 192.168.10.0 network should be permitted access. However, the ACL does not accomplish this. Which changes would correct this problem?ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANDescribe the two basic rules associated with the placement of standard and extended ACLs.ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANDescribe the “three Ps” rule associated with access control lists.ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANCategorize the following descriptions as belonging to either a standard IP ACL or an extended IP ACL:ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANRefer to the exhibit and the following configuration. Which statement correctly describes how Router1 processes packets with this configuration?ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANWhich IP address and wildcard mask test for hosts from an entire subnet of network 192.168.12.0 using a 29-bit mask?ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANMatch each command with its description:ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANWhat occurs if the network administrator applies an IP access control list that has no permit statement outbound on an interface? (Choose two.)ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANWhich statement is true about applying an access list to an interface?ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANWhich statements correctly describe Cisco access control lists? (Choose two.)ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANList the three steps required to update a router with a new Cisco IOS image file located on a TFTP server.ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANList the steps to enable the lockdown feature of SDM.ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANList five vulnerable Cisco IOS network services, and provide the best practices associated with them. For example, unused interfaces should be disabled.ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANRefer to the exhibit. To increase administrative access security, you have applied the following configuration. However, you are unable to establish an SSH connection to router R1. Assume that you could telnet to the router before, and that the hostname, IP domain name, and crypto key have been correctly configured. Which changes would correct this problem?ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWAN