Which of the following statements apply only to extended access lists, not to standard access lists? (Select two.)
You can assign more than one list per direction to each interface.
Which of the following statements about ACLs are true? (Select two.)
Which of the following describes how ACLs can improve network security?
-An ACL filters traffic by the IP header information such as source or destination IP address, protocol, or socket numbers.
Your router currently has two ACLs:
One list denies SAP broadcasts and allows all other traffic. This list is applied to outbound traffic on Serial0.
The second list denies Telnet traffic and allows all other traffic. This list is applied to inbound traffic on Serial1.
You also want to restrict all outbound traffic sent through Serial0 from network 192.168.2.0/24. How should you configure ACLs on the router to meet all current and new requirements with as little effort as possible?
Create a new ACL that denies traffic from network 192.168.2.0/24 and permits all other traffic. Apply the ACL to the Serial0 interface for outbound traffic.
You want to control Telnet access to your router and only allow access from within the corporate network. You have subnetted your network so that all IP addresses use subnets of the 172.18.0.0/16 network.
You want to apply the ACL to the VTY lines. Which of the following would be part of your design? (Select two.)
You have used the following commands at the router console to create an IP access list and switch to interface configuration mode:
Router(config)#access-list 122 permit tcp 10.6.0.0 0.0.255.255 any
Router(config)#int eth 0
Which of the following commands would you use to add the access list to this interface and filter incoming packets?
ip access-group 122 in
Which of the following commands can you use to see which ACL is applied to the first Ethernet interface?
sh ip int
You have just finished configuring ACL 101 and are ready to apply it to an interface. Before you do this, you would like to view the ACL to ensure there are no mistakes. Which command displays access list 101?
show access-lists 101
You are configuring ACLs for a router. You need to create a standard IP access list that permits all traffic except traffic from the 192.168.1.0/24 network .
To verify that the ACL is configured correctly and functioning as intended, you want to view extended information about matches for each line in the ACL as packets are processed by the router.
Which two commands would you use to view the information you need? (Select two.)
Your company has two subnets, 172.16.1.0 and 172.16.2.0, as shown in the exhibit. You want to prevent public Telnet traffic from entering your company but allow all other traffic.
Which of the following sets of statements will accomplish your goal?
-access-list 101 deny tcp 172.16.0.0 0.0.255.255 any eq 23
access-list 101 permit ip 172.16.2.0 0.0.255.255 any
interface serial 0
ip access-group 101 in
-access-list 101 deny tcp 172.16.0.0 0.0.255.255 any eq 23
access-list 101 permit ip 172.16.2.0 0.0.255.255 any
interface serial 0
ip access-group 101 out
-access-list 101 deny tcp any 172.16.0.0 0.0.255.255 eq 23
access-list 101 permit ip any 172.16.2.0 0.0.255.255
interface serial 0
ip access-group 101 in
-access-list 101 deny tcp any 172.16.0.0 0.0.255.255 eq 23
access-list 101 permit ip any 172.16.2.0 0.0.255.255
interface serial 0
ip access-group 101 out
-access-list 101 deny tcp any 172.16.0.0 0.0.255.255 eq 23
-access-list 101 permit ip any 172.16.2.0 0.0.255.255
interface serial 0
ip access-group 101 in
Which of the following numbering ranges are used by extended ACLs? (Select two.)
200-269
2000-2699
Which of the following is a good general rule regarding the placement of extended ACLs?
Extended ACLs should be placed as close as possible to the source router.
Which of the following describe the attributes that extended ACLs can use to filter network traffic? (Select two.)
Extended ACLs can filter network traffic based on source protocol (i.e., IP, TCP, UDP, etc.).
Extended ACLs can filter network traffic based on destination hostname or host IP address.
Which of the following statements are true about IPv6 ACLs? (Select two.)
IPv6 ACLs are similar to IPv4 extended named ACLs in functionality.
IPv6 ACLs do not use wildcard masks.
Which command is used to apply an IPv6 ACL to an interface?
ipv6 traffic-filter
Which command uses the correct syntax and argument to create an IPv6 ACL?
ipv6 access-list DENY_FTP
You want to create an ACL statement that allows traffic from any network. Which network address and wildcard mask value should you use?
0.0.0.0 255.255.255.255
You are configuring ACLs on a router, and you want to deny traffic being sent to the 10.10.16.0/21 network.
Which wildcard mask should you use with the access-list statement?
0.0.7.255
You are configuring ACLs for a router. You need to create an extended IP access list that rejects any packets sent from a host with an IP address of 10.1.1.1 to a host with an IP address of 15.1.1.1. All other traffic should be allowed.
To verify that the ACL is configured correctly and functioning as intended, you want to view extended information about matches for each line in the ACL as packets are processed by the router.
Which two commands are needed to view the information? (Select two.)
access-list 101 deny ip 10.1.1.1 0.0.0.0 15.1.1.1 0.0.0.0 log
access-list 101 permit ip any any log
Your company has two subnets, 172.16.1.0 and 172.16.2.0, as shown. You want to protect your 172.16.2.0 subnet from all traffic except traffic originating from subnet 172.16.1.0. You don’t want anyone to Telnet into host 172.16.2.13. You currently have no filters applied to your router. You’ve created the following access list:
access-list 101 deny tcp 172.16.1.0 0.0.255.255 host 172.16.2.13 eq 23
access-list 101 permit ip 172.16.1.0 0.0.255.255 172.16.2.0 0.0.0.255
Where should you apply this filter?