CCNA 3 v7 Modules 3
CCNA 3 v7 Modules 3
Answers
Dec 22, 2019 Last updated on: Mar 21, 2020 CCNA v7 Course #3 12
Comments
Share TweetSharePin itReddit
inbound
R2 S0/0/1
R1 Gi0/1.12
outbound
R1 S0/0/0
R2 Gi0/1.20
Explanation: A standard access list is commonly placed as
close to the destination network as possible because access
control expressions in a standard ACL do not include
information about the destination network.
The destination in this example is printer VLAN 12 which has
router R1 Gigabit subinterface 0/1/.12 as its gateway. A
sample standard ACL that only allows printing from data
VLAN 10 (192.168.10.0/24), for example, and no other VLAN
would be as follows:
33.
Refer to the exhibit. An administrator first configured an
extended ACL as shown by the output of the show access-
lists command. The administrator then edited this access-
list by issuing the commands below.
Router(config)# ip access-list extended 101
Router(config-ext-nacl)# no 20
6
6
0
6
newestoldestmost voted
Guest
Anon
24. What is the best description of Trojan horse malware?
{ } It is software that causes annoying but not fatal computer problems.
{ } It is the most easily detected form of malware.
{ } It is malware that can only be distributed over the Internet.
{ x } It appears as useful software but hides malicious code.
0 Reply
26 days ago
Author
CCNA Questions Answers
Thanks so much!
0 Reply
25 days ago
Guest
Robin
What is the best description of Trojan horse malware?
It is malware that can only be distributed over the Internet.
It appears as useful software but hides malicious code. (x)
It is software that causes annoying but not fatal computer problems.
It is the most easily detected form of malware.
0 Reply
1 month ago
Author
0 Reply
25 days ago
Guest
Bogdan
What is the term used to describe gray hat hackers who publicly protest
organizations or governments by posting articles, videos, leaking sensitive
information, and performing network attacks?
script kiddies
grey hat hackers
hacktivists
white hat hackers
5 Reply
2 months ago
Guest
dav
answer is hacktivists
0 Reply
1 month ago
Guest
Bogdan
What wild card mask will match networks 172.16.0.0 through 172.19.0.0?
0.0.3.255
0.252.255.255
{X} 0.3.255.255
0.0.255.255
3 Reply
2 months ago
Guest
rfrco
Additional questions not listed:
33 A technician is tasked with using ACLs to secure a router. When would
the technician use the ‘ip access-group 101 in’ configuration option or
command?
– to apply an extended ACL to an interface (Ans)
– to secure management traffic into the router
– to secure administrative access to the router
– to display all restricted traffic
22 In which type of attack is falsified information used to redirect users to
malicious Internet sites?
– DNS amplification and reflection
– ARP cache poisoning
– DNS cache poisoning (Ans)
– domain generation
0 Reply
2 months ago
Author
0 Reply
2 months ago
Guest
rfrco
The following questions were not listed: 11 What is a feature of an IPS? – It
can stop malicious packets. (Answer) – It is deployed in offline mode. – It
has no impact on latency. – It is primarily focused on identifying possible
incidents. 54 What is the term used to describe a potential danger to a
company’s assets, data, or network functionality? – vulnerability – threat
(Answer) – asset – exploit 56 Refer to the exhibit. Network 192.168.30.0/24
contains all of the company servers. Policy dictates that traffic from the
servers to both networks 192.168.10.0 and 192.168.11.0 be limited… Read
more »
0 Reply
2 months ago
Guest
rfrco
Here are some more: 32 What does the CLI prompt change to after entering the
command ip access-list standard aaa from global configuration mode? – Router(config-
line)# – Router(config-std-nacl)# (Answer) – Router(config)# – Router(config-router)# –
Router(config-if)# 63 Refer to the exhibit. Many employees are wasting company time
accessing social media on their work computers. The company wants to stop this
access. What is the best ACL type and placement to use in this situation? – extended
ACL outbound on R2 WAN interface towards the internet – standard ACL outbound on
R2 WAN interface towards the internet – standard ACL outbound on… Read more »