Anda di halaman 1dari 6

Security - Networking Questions and Answers

1 of 6

http://www.indiabix.com/networking/security/

Home Aptitude Logical Reasoning Verbal Ability GK Engineering Interview Online Test Puzzles Ask
Now !

Networking :: Security
Why Networking Security?
In this section you can learn and practice Networking Questions based on "Security" and improve your skills in
order to face the interview, competitive examination and various entrance test (CAT, GATE, GRE, MAT, Bank
Exam, Railway Exam etc.) with full confidence.

Where can I get Networking Security questions and answers with


explanation?
IndiaBIX provides you lots of fully solved Networking (Security) questions and answers with Explanation.
Solved examples with detailed answer description, explanation are given and it would be easy to understand. All
students, freshers can download Networking Security quiz questions with answers as PDF files and eBooks.

Where can I get Networking Security Interview Questions and


Answers (objective type, multiple choice)?
Here you can find objective type Networking Security questions and answers for interview and entrance
examination. Multiple choice and true or false type questions are also provided.

How to solve Networking Security problems?


You can easily solve all kind of Networking questions based on Security by practicing the objective type
exercises given below, also get shortcut methods to solve Networking Security problems.
Home Engineering Networking Security Security

Exercise :: Security - Security


Security - Security
1. Which of the following is true regarding access lists applied to an interface?
A.You can place as many access lists as you want on any interface until you run out of memory.
B.You can apply only one access list on any interface.
C.One access list may be configured, per direction, for each layer 3 protocol configured on an interface.
D.You can apply two access lists to any interface.

14-08-2016 17:52

Security - Networking Questions and Answers

2 of 6

http://www.indiabix.com/networking/security/

Answer: Option C
Explanation:
A Cisco router has rules regarding the placement of access lists on a router interface. You can place one
access list per direction for each layer 3 protocol configured on an interface.
Workspace

Report errors

View Answer Discuss in Forum Workspace Report


2. Which command would you use to apply an access list to a router interface?
A.ip access-list 101 out
B.access-list ip 101 in
C.ip access-group 101 in
D.access-group ip 101 in
Answer: Option C
Explanation:
To apply an access list, the proper command is ip access-group 101 in.
Workspace

Report errors

View Answer Discuss in Forum Workspace Report


3. Which of the following is an example of a standard IP access list?

14-08-2016 17:52

Security - Networking Questions and Answers

3 of 6

http://www.indiabix.com/networking/security/

A.access-list 110 permit host 1.1.1.1


B.access-list 1 deny 172.16.10.1 0.0.0.0
C.access-list 1 permit 172.16.10.1 255.255.0.0
D.access-list standard 1.1.1.1
Answer: Option B
Explanation:
Standard IP access lists use the numbers 1-99 and 1300-1999 and filter based on source IP address only.
Option C is incorrect because the mask must be in wildcard format.
Workspace

Report errors

View Answer Discuss in Forum Workspace Report


4. You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to
192.168.191.0. Which of the following lists will you use?
A.access-list 10 deny 192.168.160.0 255.255.224.0
B.access-list 10 deny 192.168.160.0 0.0.191.255
C.access-list 10 deny 192.168.160.0 0.0.31.255
D.access-list 10 deny 192.168.0.0 0.0.31.255
Answer: Option C
Explanation:
The range of 192.168.160.0 to 192.168.191.0 is a block size of 32. The network address is 192.168.160.0 and
the mask would be 255.255.224.0, which for an access list must be a wildcard format of 0.0.31.255. The 31 is
used for a block size of 32. The wildcard is always one less than the block size.
Workspace

Report errors

14-08-2016 17:52

Security - Networking Questions and Answers

4 of 6

http://www.indiabix.com/networking/security/

View Answer Discuss in Forum Workspace Report


5. You are working on a router that has established privilege levels that restrict access to certain functions. You
discover that you are not able to execute the command show running-configuration. How can you view and
confirm the access lists that have been applied to the Ethernet 0 interface on your router?
A.show access-lists
B.show interface Ethernet 0
C.show ip access-lists
D.show ip interface Ethernet 0
Answer: Option D
Explanation:
The only command that shows which access lists have been applied to an interface is show ip interface
Ethernet 0. The command show access-lists displays all configured access lists, and show ip access-lists
displays all configured IP access lists, but neither command indicates whether the displayed access lists have
been applied to an interface.
Workspace

Report errors

View Answer Discuss in Forum Workspace Report


1 2 3 4 Next

Ccna Security
Get Trained By Hepta CCIE CCIE Security Bootcamp

Have a question?
Ask your question now !

14-08-2016 17:52

Security - Networking Questions and Answers

5 of 6

http://www.indiabix.com/networking/security/

14-08-2016 17:52

Security - Networking Questions and Answers

6 of 6

http://www.indiabix.com/networking/security/

2009 - 2016 by IndiaBIX Technologies. All Rights Reserved. | Copyright | Terms of Use & Privacy Policy
Contact us: info-@-@indiab@ix.com

Follow us on twitter!

14-08-2016 17:52

Anda mungkin juga menyukai