Module 22 Exam Back to Main Page 1. Tick the range of numbers you can use for extended IP access lists.1-991300-1999100-1992000-2699Question 1 of 12 2. Standard IP access lists filter traffic based on the IP destination address of the traffic only.TrueFalseQuestion 2 of 12 3. Write the wildcard mask to match subnet 255.255.192.00.0.63.2550.0.15.2550.0.7.2550.0.31.255Question 3 of 12 4. Which access list tag command will check if the ACK or RST (reset) bit is set indicating that the packet is a response packet to a TCP request made from your network and thus it is safe.check tagestablishedrstlogQuestion 4 of 12 5. Which access-list format will block TFTP traffic from host 10.1.1.1 to any host or network.access-list 102 deny udp host 10.1.1.1 any eq 69access-list 102 deny udp any host 10.1.1.1 eq 69access-list 102 deny udp host 10.1.1.1 any eq 53access-list 102 deny udp any host 10.1.1.1 eq 53access-list 10 deny udp host 10.1.1.1 any eq 69access-list 102 deny udp 10.1.1.1 any eq 69Question 5 of 12 6. Match the services with the correct port number.File Transfer Protocol (FTP) 22Unselect25Unselect161/162Unselect21Unselect443Unselect53Unselect110Unselect69Unselect23UnselectTelnet 22Unselect25Unselect161/162Unselect21Unselect443Unselect53Unselect110Unselect69Unselect23UnselectSimple Mail Transfer Protocol (SMTP) 22Unselect25Unselect161/162Unselect21Unselect443Unselect53Unselect110Unselect69Unselect23UnselectSecure Shell (SSH) 22Unselect25Unselect161/162Unselect21Unselect443Unselect53Unselect110Unselect69Unselect23UnselectDomain Name System (DNS) 22Unselect25Unselect161/162Unselect21Unselect443Unselect53Unselect110Unselect69Unselect23UnselectTrivial File Transfer Protocol (TFTP) 22Unselect25Unselect161/162Unselect21Unselect443Unselect53Unselect110Unselect69Unselect23UnselectPost Office Protocol (POP3) 22Unselect25Unselect161/162Unselect21Unselect443Unselect53Unselect110Unselect69Unselect23UnselectSimple Network Management Protocol (SNMP) 22Unselect25Unselect161/162Unselect21Unselect443Unselect53Unselect110Unselect69Unselect23UnselectHTTP Secure (HTTPS) 22Unselect25Unselect161/162Unselect21Unselect443Unselect53Unselect110Unselect69Unselect23UnselectQuestion 6 of 12 7. Your colleague calls you to say that he has added an access list but now all OSPF traffic is being blocked. Which config line do you tell him to add?access-list 101 permit ospf any anyaccess-list 101 permit ip ospf any anyaccess-list 101 ip any any eq 89access-list 101 permit any any eq ospfQuestion 7 of 12 8. Each IP access list can only be used once by the router.TrueFalseQuestion 8 of 12 9. Which command will apply an access list to a telnet line?Router(config-line)#ip access-class 10 inRouter(config-line)#access-group 10 inRouter(config-line)#access-class 10 inRouter(config-line)#access-class 10 permitQuestion 9 of 12 10. There is an optional ___ command that you can add to the end of an ACL.trackmonitortaglogQuestion 10 of 12 11. Which port number will match HTTP Secure (HTTPS) traffic on your ACL?2223443110Question 11 of 12 12. What will the below ACL achieve? R1(config)#ip access-list resequence CCNA 200 15Starts the ACL at 200 and lines increment in multiples of 15.Resequencing ACL 200 starting from number 15.Resequencing ACL from networks 200 and wildcard 15 bits.Starts the ACL at 15 and lines increment in multiples of 200.Question 12 of 12 Loading...