Preview

Ccna 3 Chapter 8 V4.0 Answers

Good Essays
Open Document
Open Document
2217 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ccna 3 Chapter 8 V4.0 Answers
1.Refer to the exhibit. A network administrator needs to add the command deny ip
10.0.0.0 0.255.255.255 any log to R3. After adding the command, the administrator verifies the change using the show access - list command. What sequence number does the new entry have?

0 10, and all other items are shifted down to the next sequence number 50 60 *****

2.Refer to the exhibit. What happens if the network administrator issues the commands shown when an ACL called Managers already exists on the router? The new commands overwrite the current Managers ACL. The new commands are added to the end of the current Managers ACL. *****

The new commands are added to the beginning of the current Managers ACL. An error appears stating that the ACL already exists.

3
Why are inbound ACLs more ef ficient for the router than outbound ACLs? Inbound ACLs deny packets before routing lookups are required. ***** Inbound ACL operation requires less network bandwidth than outbound. Inbound ACLs permit or deny packets to LANs, which are typically more effic ient than WANs. Inbound ACLs are applied to Ethernet interfaces, while outbound ACLs are applied to slower serial interfaces.

4

Refer to the exhibit. The network administrator of a company needs to configure the router RTA to allow its business partner
(Partner A) to access the web server located in the internal network. The web server is assigned a private IP address, and a static
NAT is configured on the router for its public IP address. Finally, the administrator adds the ACL. However, Partner A is de nied access to the web server. What is the cause of the problem? Port 80 should be specified in the ACL. ***** The public IP address of the server, 209.165.201.5, should be specified as the destination. The ACL should be applied on the s0/0 outbound interf ace. The source address should be specified as 198.133.219.0 255.255.255.0 in

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Appendix A: All Rules and SummariesAdministrationEXEC Passwords Not Using Type 5 Encryption (1 note)User Account Not At Level 1 (2 notes)Route Maps and ACLsDeny All ACL (1 warning)System LoggingACL Deny Statement Not Logged (1 note)…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Qnt 351 Final Exam Answers

    • 1123 Words
    • 5 Pages

    3) The performance of personal and business investments is measured as a percentage, return on investment. What type of variable is return on investment?…

    • 1123 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    In the file ACC 561 Week 3 Discussion Question 1 you will find right answers on the following task: "Select a costing method: process, job, or activity based. Describe the nature of your chosen method. What types of organizations should choose that method? How is this method different from the costing methods you did not choose? Use your selected costing method to create a real-life business management scenario that includes realistic numbers. What management decisions may one make based on your scenario?"…

    • 608 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets?…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This document PHL 458 Week 2 Discussion Questions 3 has solutions of the following question: "How do you measure or analyze multiple creative solutions to your own problems? "…

    • 580 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Exercise 1

    • 149 Words
    • 1 Page

    6. If the company decided to configure sites, where would you expect them to be located?…

    • 149 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    You Decide week 5

    • 831 Words
    • 3 Pages

    Good day MS Kim, I would like to explain the available options of Access Control Lists what will do and what types of ACLs there are. Complex ACLs can be tricky but will better for security for the network. There are three different types of ACLs, Dynamic ACL, Reflexive ACL, and Time Based ACL. Each ACL is unique to the type of network we have. Dynamic are also called lock-and-key ACLs which only allow IP traffic only. Also the lock-and-key authenticates the user and permits limited access through the firewall router for a host for a time. Time Based ACLs are a specific time that traffic is allowed on the network. When the device determines that an ACL applies to a packet, it tests the packet against the rules. The first matching rule determines whether the packet is permitted or denied. If there is no match, the device applies a default rule. The device processes packets that are permitted and drops packets that are denied. “ACLs protect networks and specific hosts we would be able to specify certain days and hours of which the user will have access to the network. With this type of ACL there is more control over permitting or denying access to resources. Reflexive ACL allows outbound traffic from the network and limits the inbound traffic. This allows greater control over what traffic is on the network and able to expend the control list. Also, with Reflexive when ACL, an unknown IP address is trying to gain access, it will put the IP address in a temporary ACL group and will await replies from the network and the network will automatically remove the IP address when the session is over. It is probably in the best interest for our network to concentrate on Reflexive ACLs for these reasons;…

    • 831 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This exam consists of 20 questions of equal value on a total of 4 pages including this cover page.…

    • 746 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lesson 11

    • 534 Words
    • 2 Pages

    3. Which of the following commands can be used to configure Active Directory permissions from the…

    • 534 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 838 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Answers To Assignment 2 1

    • 2996 Words
    • 21 Pages

    Be Sure to submit these assignments by 09/27/2014 on BlackBoard, under “Assignment-Week 2. Answers must be labeled properly, with all pertinent information. No late submissions will be accepted.…

    • 2996 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    American international relations are extremely scattered, and when examined can be interpreted in many different ways. This may be because there is perhaps a blend of these major schools of American foreign policy in all of our international relations. The major schools that will be used as lenses are isolationism, liberal internationalism, Kissingerian realism, democratic globalism, and democratic realism. I am going to use these lenses to examine how the liberation in Iraq was handled, and what foreign policy was mainly used.…

    • 2543 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    There are many different types of equipment I use within the office some of which are computers, telephones, printers , scanners etc.…

    • 1920 Words
    • 8 Pages
    Powerful Essays

Related Topics