IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNAWhich two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, DevNetWhat two ACEs could be used to deny IP traffic from a single source host 10.1.1.1 to the 192.168.0.0/16 network? (Choose two.)ITExamAnswers asked 4 years ago • CCNAWhich two commands will configure a standard ACL? (Choose two.)IT Administrator asked 3 years ago • CCNAConsider the access list command applied outbound on a router serial interface. What is the effect of applying this access list command?IT Administrator asked 3 years ago • CCNAWhat packets would match the access control list statement that is shown below?IT Administrator asked 3 years ago • CCNAWhich command will verify the number of packets that are permitted or denied by an ACL that restricts SSH access?IT Administrator asked 3 years ago • CCNAConsider the configured access list. What are two characteristics of this access list? (Choose two.)IT Administrator asked 3 years ago • CCNAThe computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)ITExamAnswers asked 4 years ago • CCNAIf the provided ACEs are in the same ACL, which ACE should be listed first in the ACL according to best practice?ITExamAnswers asked 3 years ago • CCNA, CCNA SecurityA college student is studying for the Cisco CCENT certification and is visualizing extended access lists. Which three keywords could immediately follow the keywords permit or deny as part of an extended access list? (Choose three.)ITExamAnswers asked 4 years ago • CCNAWhich range represents all the IP addresses that are affected when network 10.120.160.0 with a wildcard mask of 0.0.7.255 is used in an ACE?ITExamAnswers asked 4 years ago • CCNAWhen creating an ACL, which keyword should be used to document and interpret the purpose of the ACL statement on a Cisco device?IT Administrator asked 3 years ago • CCNAA network administrator is configuring an ACL to restrict access to certain servers in the data center. The intent is to apply the ACL to the interface connected to the data center LAN. What happens if the ACL is incorrectly applied to an interface in the inbound direction instead of the outbound direction?ITExamAnswers asked 4 years ago • CCNAA network administrator configures an ACL with the command R1(config)# access-list 1 permit 172.16.0.0 0.0.15.255. Which two IP addresses will match this ACL statement? (Choose two.)ITExamAnswers asked 3 years ago • CCNP, CCNA, CCNA SecurityWhich two conditions would cause a router to drop a packet? (Choose two.)IT Administrator asked 3 years ago • CCNA