Posted by : Mandie Saturday, 25 June 2011

Free CCNA Practice Stuff Packet Tracer Activities Practice Questions For CCNA Exam




1. What  are the two types of access lists that  can be configured on a Cisco router?

A. Standard
 B. Extended
 C. Filtering
D. Packet

2. When using access lists, what does a Cisco router check first?

A. To see if the packet is routable or bridgeable
B. The destination address
C. The source address
D. The packet contents

3.How many access lists are allowed per interface?

A. One per port, per protocol
 B. Two per port, per protocol
 C. Unlimited
D. Router interface  +1 per port.    

4. What do the following commands accomplish?

access-list 1 deny 172.16.4.0  0.0.0.255 access-list 1 permit any
interface ethernet 0
IP access-group 1 out




A. This will block traffic from subnet 172.16.4.0 and allow all other traffic.
B. This will allow traffic from subnet 172.16.4.0 and block all other traffic.
C. All traffic is allowed.
D. All traffic is blocked.

5. What do the following statements in an extended access list accomplish?

access-list 101 deny TCP 172.16.4.0  0.0.0.255  172.16.3.0  0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0  0.0.0.255  172.16.3.0  0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0  0.0.0.255  0.0.0.0  255.255.255.255

A. This will block ftp traffic.
 B. This will block http traffic.
C. This will permit ftp traffic.
 D. This will permit tftp traffic.

6. Access lists are numbered. Which of the following ranges  could be used for an IP access list?

A. 600  - 699
B. 100 - 199
C. 1 - 99
D. 800 - 899
E. 1000 - 1099

7. Cisco routers use wildcard masking to identify how to check or ignore corresponding IP address bits.  What  does setting a wildcard mask bit to 0 cause the router to do?

A. It tells the router to check the corresponding bit value.
 B. It tells the router to ignore the corresponding bit value.
 C. It tells the router to check its alternate routing list.
D. It tells the router to use its primary routing list.

8. You are a system administrator and you want to deny access to a group  of computers with addresses 172.30.16.0 to 172.30.31.0.  Which wildcard mask would you use?

A. 0.0.15.255
B. 0.0.255.255
C. 0.0.31.255
D. 0.0.127.255
E. 0.0.255.255

9. In order to limit the quantity of numbers that  a system administrator has to enter,  Cisco can use which abbreviation to indicate 0.0.0.0?

A. host
B. any
 C. all
D. include

10. What  do the following commands accomplish?

access-list 1 permit 172.16.0.0  0.0.255.255 interface ethernet 0
IP access-group 1 out
interface ethernet 1
IP access-group 1 out

A. Only traffic from the source network 172.16.0.0 will be blocked.
B. Only traffic from the source network 172.16.0.0 will be forwarded.  Non-
172.16.0.0 network traffic is blocked.
C. Non-172.16.0.0 traffic will be forwarded.
 D. All traffic will be forwarded.

11. When using access lists, it is important where those access lists are placed. Which statement best describes access list placement?

A. Put standard access lists as near the destination as possible.  Put extended access lists as close to the source as possible.
B. Put extended access lists as near the destination as possible.  Put standard access
lists as close to the source as possible.
C. It isn't import where access lists are placed since the router will read and cache the whole list.
D. Put access lists as close to corporate headquarters as possible.

12: An administrator creates an access list prohibiting Telnet on his router. He then successfully
initiates a Telnet session from the router. What is the most likely reason the access list failed?
A. The access list should be changed to stop UDP traffic.
B. The access list should be changed to stop TCP traffic.
C. The access list should be changed to block port 23 traffic.
D. The access list cannot stop the administrator's action.
13: Which of the following are valid reasons to implement access lists? (Choose three.)
A. Priority queuing
B. Route filtering
C. Dial-on-demand routing
D. Console port security
14: Which of the following are types of access lists? (Choose three.)
A. Standard
B. Extended
C. Restricted
D. Static
E. Named
F. Unnamed

15: Which types of access lists can filter traffic based on the source port? (Choose two.)
A. Standard
B. Extended
C. Restricted
D. Static
E. Named
F. Unnamed
16: Which type of access list can filter based only on the source address of a packet?
A. Standard
B. Extended
C. Dynamic
D. Static
E. Named
F. Unnamed
17: Which of the following identifiers can be used for standard access lists? (Choose two.)
A. 91
B. 107
C. 1270
D. 1902
18: Which of the following identifiers can be used for extended access lists? (Choose two.)
A. 99
B. 100
C. 2500
D. 2700
19: Which access list type allows you to delete entries in a specific access list?
A. Standard
B. Extended
C. Named
D. Unnamed
20: You are filtering traffic to an FTP site and you want only FTP traffic to reach the server. You do
not want additional traffic to reach the server. Which traffic should be allowed?
A. TCP on ports 20 and 21
B. UDP on ports 20 and 21
C. TCP on port 21
D. TCP and UDP on ports 20 and 21


        
Solution :

1.       A,B
2.       A
3.       A
4.       A
5.       A
6.       B,C
7.       A
8.       A
9.       A
10.   B
11.   A
12.   D
13.   A,B,C
14.   A,B,E
15.   B,E
16.   A
17.   A,D
18.   B,C
19.   C
20.   A

    



             


- Copyright © Network Hopper -network-hopper- Powered by Blogger