IT Questions Bank An access list was written with the four statements shown in the graphic. Which single access list statement will combine all four of these statements into a single statement that will have exactly the same effect?ITExamAnswers asked 4 years agoRefer to the graphic. It has been decided that Workstation 1 should be denied access to Server1. Which of the following commands are required to prevent only Workstation 1 from accessing Server1 while allowing all other traffic to flow normally? (Choose two.)ITExamAnswers asked 4 years agoRefer to the exhibit. The access list has been configured on the S0/0 interface of router RTB in the outbound direction. Which two packets, if routed to the interface, will be denied? (Choose two.)ITExamAnswers asked 4 years agoWhat are two characteristics of SSH? (Choose two.)ITExamAnswers asked 4 years agoRefer to the exhibit. Statements A, B, C, and D of ACL 10 have been entered in the shown order and applied to interface E0 inbound, to prevent all hosts (except those whose addresses are the first and last IP of subnet 172.21.1.128/28) from accessing the network. But as is, the ACL does not restrict anyone from the network. How can the ACL statements be re-arranged so that the system works as intended?ITExamAnswers asked 4 years agoRefer to the exhibit. An attempt to deny web access to a subnet blocks all traffic from the subnet. Which interface command immediately removes the effect of ACL 102?ITExamAnswers asked 4 years agoWhen you are troubleshooting an ACL issue on a router, Which command would you use to verify Which interfaces are affected by the ACL?ITExamAnswers asked 4 years agoRefer to exhibit. A network administrator cannot establish a Telnet session with the indicated router. What is the cause of this failure?ITExamAnswers asked 4 years agoWhich command encrypts all plaintext passwords?ITExamAnswers asked 4 years agoRefer to the exhibit. What is the effect of the configuration that is shown?ITExamAnswers asked 4 years agoWhat can be done to secure the virtual terminal interfaces on a router? (Choose two.)ITExamAnswers asked 4 years agoHow does using the service password-encryption command on a router provide additional security?ITExamAnswers asked 4 years agoA network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts on networks 192.168.146.0, 192.168.147.0, 192.168.148.0, and 192.168.149.0 only. Which two ACL statements, when combined, would you use to accomplish this task? (Choose two.)ITExamAnswers asked 4 years agoWhich statement about access lists that are applied to an interface is true?ITExamAnswers asked 4 years agoOn Which combinations are standard access lists based?ITExamAnswers asked 4 years ago