Network Device Security (ENCOR, CCNP Quiz)

Please enter your email:

Which type of ACL is this?

#access-list 1 deny   host 10.0.0.1
#access-list 1 permit 10.0.0.0 0.0.0.255
#access-list 1 permit 192.168.0.0 0.0.255.255

 
 
 
 

Which type of ACL is this?

#access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80
#access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443
#access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443

 
 
 
 

When implementing port security, which command allows pre-defined quantity of MAC addresses?

 
 
 
 

How can we best prevent Data Loss Layer2 attacks?

 
 
 
 

Which of these is correct method to assign an Access Control List to a physical interface?

 
 
 
 

Which of these is correct method to assign ACL to Telnet?

 
 
 
 

Phishing falls under which type of Security attacks?

 
 
 
 

What will be the final result of this ACL:

#access-list 1 deny host 172.0.0.1
#access-list 1 permit host 172.0.0.1

 
 
 
 

Which type of Security architecture (security system) is this?

 
 
 
 

What are the individual entries in Access Control Lists called?

 
 
 
 

Written by 

Leave a Reply

Your email address will not be published. Required fields are marked *