Module 3-5
Module 3-5
• The commands are added at the end of the existing Managers ACL.
• The commands overwrite the existing Managers ACL.
• The commands are added at the beginning of the existing Managers
ACL.
• The network administrator receives an error that states that the ACL
already exists.
27. In which TCP attack is the cybercriminal attempting to overwhelm a target
host with half-open TCP connections?
• port scan attack
• SYN flood attack
• session hijacking attack
• reset attack
28. Which protocol is attacked when a cybercriminal provides an invalid
gateway in order to create a man-in-the-middle attack?
• DHCP
• DNS
• ICMP
• HTTP or HTTPS
29. Refer to the exhibit. An administrator has configured a standard ACL on R1
and applied it to interface serial 0/0/0 in the outbound direction. What
happens to traffic leaving interface serial 0/0/0 that does not match the
configured ACL statements?
• inbound
• R2 S0/0/1
• R1 Gi0/1.12
• outbound
• R1 S0/0/0
• R2 Gi0/1.20
31. Which statement describes a characteristic of standard IPv4 ACLs?
• They are configured in the interface configuration mode.
• They can be configured to filter traffic based on both source IP
addresses and source ports.
• They can be created with a number but not with a name.
• They filter traffic based on source IP addresses only.
32. What is considered a best practice when configuring ACLs on vty lines?
• Place identical restrictions on all vty lines.
• Remove the vty password since the ACL restricts access to trusted
users.
• Apply the ip access-group command inbound.
• Use only extended access lists.
33. Refer to the exhibit. An administrator first configured an extended ACL as
shown by the output of the show access-lists command. The administrator
then edited this access-list by issuing the commands below.
Router(config-ext-nacl)# no 20