How do you maintain security in multiple websites?
vpn
dmvpn
other
SHOW ANSWERWhich WAN topology is most appropriate for a centrally located server farm with several satellite
branches?
star
hub and spoke
point-to-point
full mesh
SHOW ANSWERWhen you deploy multilink PPP on your network, where must you configure the group IP Address
on each device?
In the global config
Under serial interface
Under the routing protocol
Under the multilink interface
SHOW ANSWERWhich item represents the standard IP ACL?
Access-list 50 deny 19.168.1.1 0.0.0.255
Access-list 110 permit IP any any
Access-list 2500 deny tcp any host 192.168.1.1 eq 22
Access-list 101 deny tcp any host 192.168.1.1
SHOW ANSWEROn which option are standard access list based?
Destination address and wildcard mask
Destination address and subnet mask
Source address and subnet mask
Source address and wildcard mask
SHOW ANSWERWhat is the type of access list that can be configured on a Cisco router?
Packet
Standard
Complex
Filtering
SHOW ANSWERAccess list are numbered. Which of the following range could be used for an IP access list?
800-899
100-199
none of these
600-699
SHOW ANSWERWhich statement about access list that are applied to an interface is true?
You can apply only one access list on any interface
You can configure one access list, per direction, per layer 3 protocol
You can place as many access lists as you want on any interface
You can configure one access list per direction, per layer 2 protocol
SHOW ANSWERThe following access list below was applied outbound on the E0 interface connected to the 192.168.1.8/29 LAN:
Access-list 135 deny tcp 192.168.1.8 0.0.0.7 eq 20 any
Access-list 135 deny tcp 192.168.1.8 0.0.0.7 eq 21 deny
How will the above access list affected traffic?
FTP traffic from 192.168.1.22 will be denied
No traffic, except for FTP traffic will be allowed to exit E0
FTP traffic from 192.168.1.9 to any host will be denied
All traffic exiting E0 will be denied
All FTP traffic to network 192.168.1.9/29 will denied
SHOW ANSWERWhich of the following access list detects source and destination IP addresses, protocol field in the network layer header and the port number at the transport layer header?
Named access list
Standard access list
Extended access list
Numbered access list
SHOW ANSWERBasic firewall protects a network consisting of only host systems?
True
False
SHOW ANSWERWhich of the following access list which of the following access list will allow only HTTP traffic into network 196.15.7.0?
Access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www
Access-list 10 permit tcp any 196.15.7.0 eq www
Access-list 100 permit 196.15.7.0 0.0.0.255 eq www
Access-list 110 permit ip any 196.15.7.0 0.0.0.255
Access-list 110 permit www 196.15.7.0 0.0.0.255
SHOW ANSWERWhat is the most common attack on a network today?
Lock picking
Naggle
DoS
Auto secure
SHOW ANSWER