
CO3513 Revision

Quiz
•
Computers
•
University
•
Medium

Christopher Finnigan
Used 2+ times
FREE Resource
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Explain this sample ACL.
This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.
This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the egress interface of FastEthernet0/0.
This ACL allows traffic to the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.
This ACL denies traffic from the host with IP address 192.168.1.10 and denies all other traffic. It is then applied to the ingress interface of FastEthernet0/0.
Answer explanation
In this example, we create a standard ACL on Router1 to block traffic from the source IP address 192.168.1.10.
This ACL denies traffic from the host with IP address 192.168.1.10 and permits all other traffic. It is then applied to the ingress interface of FastEthernet0/0.
2.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Explain this sample ACL.
This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the ingress interface of FastEthernet0/0.
This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the egress interface of FastEthernet0/0.
This ACL permits only traffic to the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is applied to the ingress interface of FastEthernet0/0.
This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 443 to the destination IP address 192.168.2.10 and port TCP 80. It is applied to the ingress interface of FastEthernet0/0.
Answer explanation
In this example, we create an extended ACL on Router2 to allow traffic from a specific source IP address (192.168.1.10) and port (TCP port 80) to a specific destination IP address (192.168.2.10) and port (TCP port 443)
This ACL permits only traffic from the source IP address 192.168.1.10 and port TCP 80 to the destination IP address 192.168.2.10 and port TCP 443. It is then applied to the ingress interface of FastEthernet0/0.
3.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Explain this sample ACL.
This ACL denies ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.
This ACL permits only ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.
This ACL permits only ICMP traffic from any source to any destination. It is then applied to the egress interface of FastEthernet0/0.
This ACL permits any traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.
Answer explanation
In this example, we create a named ACL on Router3 to allow ICMP traffic from any source to any destination.
This ACL permits only ICMP traffic from any source to any destination. It is then applied to the ingress interface of FastEthernet0/0.
4.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Explain this sample ACL.
This ACL denies SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.
This ACL permits only SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.
This ACL permits only SSH traffic to the router from the same network only. It is then applied to the virtual terminal lines on the router.
This ACL permits only SSH traffic to the router from any source.
Answer explanation
This ACL permits only SSH traffic to the router from any source. It is then applied to the virtual terminal lines on the router.
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of these is NOT a valid reason to have VLANs in your organisation?
Data Confidentiality
Data Integrity
Scalability
Simplicity
Answer explanation
Data Confidentiality: When data is transmitted over the Internet, it can be intercepted by malicious actors.
Data Integrity: VPNs ensure the integrity of the data being transmitted by protecting it from unauthorized modification
Scalability: VPNs are easily scalable, meaning that businesses can add or remove users as needed without significant infrastructure changes.
VLANs require additional configuration and management, which can increase network complexity.
6.
DRAG AND DROP QUESTION
1 min • 2 pts
Based on this network diagram, we would issue the following commands to create the VLAN 20.
(a) and (b)
Answer explanation
(config) vlan 10
(config-vlan) name vlan10
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the following command do:
ipv6 unicast-routing
Enables the device to route IPv6 traffic between different subnets or VLANs on the network.
Disables IPv6 routing between different subnets or VLANs on the network.
Prevents other networks seeing your ipv6 network.
Enables the device to route IPv6 traffic on only the same subnets or VLAN.
Answer explanation
Without this command, the device will not be able to forward IPv6 traffic, even if it has IPv6 addresses configured on its interfaces.
Create a free account and access millions of resources
Similar Resources on Wayground
13 questions
NETW151 Midterm Review 2

Quiz
•
University
15 questions
Cisco 1, Module 12

Quiz
•
University
15 questions
F2 User Access and Permissions Quiz

Quiz
•
12th Grade - University
14 questions
SIM - Jaringan Komputer

Quiz
•
University
11 questions
CyberGames - aula 03

Quiz
•
University
20 questions
Machine Learning

Quiz
•
University
12 questions
Year 9 Networks Knowledge Check

Quiz
•
8th Grade - University
14 questions
Cisco 2, Module 5

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University