IT Questions Bank Which type of access list compares source and destination IP addresses?ITExamAnswers asked 4 years agoWhich two statements about stateful firewalls in an enterprise network are true?ITExamAnswers asked 4 years agoThe enable secret command is used to secure access to Which CLI mode?ITExamAnswers asked 4 years agoWhich command sets and automatically encrypts the privileged enable mode password?ITExamAnswers asked 4 years agoWhich two values are needed to run the APIC-EM ACL Analysis tool ?(choose two)ITExamAnswers asked 4 years agoWhich statement about named ACLs is true?ITExamAnswers asked 4 years agoWhich identification number is valid for an extended ACL?ITExamAnswers asked 4 years agoRefer to the exhibit. What is the result of setting the no login command?ITExamAnswers asked 4 years agoWhat are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)ITExamAnswers asked 4 years agoThis graphic shows the results of an attempt to open a Telnet connection to router ACCESS1 from router Remote27. Which of the following command sequences will correct this problem?ITExamAnswers asked 4 years agoThe following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.0 0.0.0.255 any. What is the effect of this access list configuration?ITExamAnswers asked 4 years agoThe following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN: access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 21 any How will the above access lists affect traffic?ITExamAnswers asked 4 years agoThe access control list shown in the graphic has been applied to the Ethernet interface of router R1 using the ip access-group 101 in command. Which of the following Telnet sessions will be blocked by this ACL? (Choose two.)ITExamAnswers asked 4 years agoAs a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?ITExamAnswers asked 4 years agoA network administrator wants to add a line to an access list that will block only Telnet access by the hosts on subnet 192.168.1.128/28 to the server at 192.168.1.5. What command should be issued to accomplish this task?ITExamAnswers asked 4 years ago