mvctc_CCNA2_ch9_KH Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Question | Answer |
If your PIX firewall violently explodes and deletes all your ACLs, what will happen to traffic as it enters the firewall? | No traffic will pass through it due to the fact that there is an implicit deny at the end of all ACLs. |
A sloppy net admin wants to allow any traffic not from the network labs network 192.5.5.0/24, enters the following commands: access-list 10 permit any any access-list 20 deny 192.5.5.0 0.0.0.255 What did they do wrong? | The permit any any is before the deny statement. |
Oh no! we hit this question! If you use only standard ACLs then where should you place them, near the source of near the destination? | Near the destination. |
After waiting for an answer to a question for 20 minuets, a network student decides that the wild card mask for a /18 network is 255.255.192.0. What did they do wrong? | They forgot that a wild card mask is the inverse subnet mask, in this case it is 0.0.63.255. |
Your mission, should you choose to accept it, is to tell what wild card mask will result from the host keyword and the any keyword. | Host results in a wild card of 0.0.0.0 and any results in a wild card of 255.255.255.255. |
Created by:
kelvinhovatter
Popular Computers sets