Network Device Security (ENCOR, CCNP Quiz)

Please enter your email:

What are the individual entries in Access Control Lists called?

 
 
 
 

What will be the final result of this ACL:

#access-list 1 deny host 172.0.0.1
#access-list 1 permit host 172.0.0.1

 
 
 
 

When implementing port security, which command allows pre-defined quantity of MAC addresses?

 
 
 
 

Which type of ACL is this?

#access-list 1 deny   host 10.0.0.1
#access-list 1 permit 10.0.0.0 0.0.0.255
#access-list 1 permit 192.168.0.0 0.0.255.255

 
 
 
 

Phishing falls under which type of Security attacks?

 
 
 
 

How can we best prevent Data Loss Layer2 attacks?

 
 
 
 

Which of these is correct method to assign ACL to Telnet?

 
 
 
 

Which type of Security architecture (security system) is this?

 
 
 
 

Which type of ACL is this?

#access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80
#access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443
#access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443

 
 
 
 

Which of these is correct method to assign an Access Control List to a physical interface?

 
 
 
 

Written by 

Leave a Reply

Your email address will not be published. Required fields are marked *