When using access lists, what does a Cisco router check first?
* To see if the packet is routable or bridgeable
* The destination address
* The source address
* The packet contents

1 Answer

Answer :

Correct answer: A
The first thing checked is to see if the packet is routable or bridgeable. If it is not, the
packet will be dropped.

Related questions

Description : What are the two types of access lists that can be configured on a Cisco router? * Standard * Extended * Filtering * Packet

Last Answer : Correct answer: A & B The access lists are standard and extended. Standard access lists for IP check the source address of packets that could be routed. Extended access lists can check the source and destination packet plus check for specific protocols, port numbers, etc

Description : How many access lists are allowed per interface? * One per port, per protocol * Two per port, per protocol * Unlimited * Router interface +1 per port.

Last Answer : Correct answer: A Only one access list is allowed per interface. An access list must have conditions that test true for all packets that use the access list.

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall

Last Answer : 2) Packet Filtering Firewall

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall

Last Answer : 2 Packet Filtering Firewall

Description : Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? * ICMP * UDP * TCP * TFTP

Last Answer : Correct answer: A ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time ... Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply.

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : What is the heat rejection of a Cisco Catalyst 2960 24TT-L?

Last Answer : I’d call Cisco. Otherwise, go with 8. It’s a good number.

Description : What are the different platforms of Cisco Aironet APs available?

Last Answer : Cisco Aironet 1500 Series Cisco Aironet 1300 Series Cisco Aironet 1240 AG Series Cisco Aironet 1230 AG Series Cisco Aironet 1200 Series Cisco Aironet 1130 AG Series Cisco Aironet 1100 Series Cisco Aironet 1000 Series

Description : What are the components with which the Cisco Aironet components can associate?

Last Answer : Not all Aironet devices can associate with all other types of Aironet devices. For instance, the Client Adapter card cannot form a wireless association with a Workgroup Bridge (WGB). Refer to Cisco Aironet Hardware Association Matrix for a complete description of association capabilities.

Description : What is the function of DDR on Cisco routers? * DDR is dial-on-demand routing. It provides a continuous LAN only connection. * DDR is dial-on-demand routing. It provides routing for high volume ... connection. * DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic.

Last Answer : Correct answer: D DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic. It initiates a call to a remote site when there is traffic to transmit

Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits

Description : When the router runs out of buffer space, this is called ________. * Source Quench * Redirect * Information Request * Low Memory

Last Answer : Correct answer: A Source quench is the process where the destination router, or end internetworking device will “quench” the date from the “source”, or the source router. This usually happens when the destination router runs out of buffer space to process packets.

Description : What's a good packet sniffer for OS X?

Last Answer : answer:Here are some that I really like: Eavesdrop: http://www.baurhome.net/software/eavesdrop/ Ettercap: http://ettercap.sourceforge.net/ KisMAC: http://kismac.macpirate.ch/about.php I still have yet to find a remarkably fast packet sniffer, but these are certainly satisfactory.

Description : Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? * Identification * Flags * Frag Offset * Type of Service * Total Length

Last Answer : Correct answer: A, B & C The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) ... Address (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : What field tells the Internet layer how to handle an IP packet? * Type of Service * IdentificationFlags * Frag Offset

Last Answer : Correct answer: A The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Where would network testing be included in an IP packet? * IP Options field * Identification field * Type of Service field * Reservation field

Last Answer : Correct answer: A The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP

Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : The _______ address in theheader ofa packet in adatagram network normally remains thesame during the entire journeyof the packet. A) source B) destination C) local D) none of the above

Last Answer : destination

Description : In virtual circuit network each packet contains ___________ a. full source and destination address b. a short VC number c. only source address d. only destination address

Last Answer : b. a short VC number

Description : In virtual circuit network each packet contains ___________ A. full source and destination address B. a short VC number C. only source address D. only destination address

Last Answer : B. a short VC number

Description : How to extend the range of wireless router?

Last Answer : First, I recommend trying the signal at different points in the garage. If the wireless adapter is USB-based this is trivially easy, but if it's a PCI adapter (inside the computer) then you might need an ... , and it might be worthwhile for other reasons too- I don't see any reason not to try it.

Description : Why does my Linksys router stop working after 20-40 minutes?

Last Answer : This happens all the time with me too. I think it has something to do with the hardware, or a wire is rusted or not connected right. try to keep your router in a certain position so that the wires are connected right. or just buy a new router.

Description : What is a good 802.11 N router?

Last Answer : I have a mac and the airport extreme has worked very well for me. I don’t know if you can set it up for PCs though.

Description : What is a router? 

Last Answer : A router is a physical device which is a gateway between two networks. It does the job of forwarding the data packets from one network to another and builds an interconnection link between the two networks. 

Description : Describe Hub, Switch and Router?

Last Answer :  Hub: Hub will broadcast all data to every port. It has a common connection point for all devices.  Switch: Switch will create the dynamic connection and provide information to the ... be responsible for forwarding data packets. Let us move to the next Computer Network Interview Questions.

Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Description : if i get a network hard drive will i be able to access it from anywhere?

Last Answer : answer:OS X Leopard will add easier networking and backup options, and if you get a new AirPort Extreme Base Station, your external hard drive can be attached to it and becomes a part of your network. Those items will be my next big Apple purchase, probably in the early part of next year. :)

Description : When you join a new " social networking site " that is asking for your home address before you can become a member, how can you be sure this information will not be used inappropriatly?

Last Answer : Here's one option: When this happens, open a new tab and do a google search with the following. Type the name of the site in question and then type the word review after it (e.g mastersofhearts.com review) ... your gut likes the most. A review will, of course, tell you if the site is legit or not.

Description : There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address? * RARP * ARP * RIP * IGRP

Last Answer : Correct answer: A ARP (Address Resolution Protocol) maps an IP address to the MAC address, RARP (Reverse Address Resolution Protocol) maps the MAC address to the IP address. ARP and RARP work at the internet layer of the Internet Model or the network layer of the OSI model.

Description : Which IP Address Class can have 16 million subnets but support 254 hosts? * Class C * Class A * Class B * Class D

Last Answer : Correct answer: A Possible Subnets IP Address Class Possible Hosts

Description : Which IP Address Class is INCORRECTLY paired with its range of network numbers? * Class A addresses include 192.0.0.0 through 223.255.255.0 * Class A addresses include 1.0.0.0 through 126.0.0.0 * Class B ... 192.0.0.0 through 223.255.255.0 * Class D addresses include 224.0.0.0 through 239.255.255.0

Last Answer : 1

Description : You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary? * 10101100 00010000 * 00000010 10100000 * 10101100 00000000 * 11100000 11110000

Last Answer : Correct answer: A To find the network address, convert the IP address to binary-10101100 000100000 00000010 10100000-then ANDed it with the subnet mask-11111111 11111111 00000000 00000000. The rest is ... that the class of an address can be determined by the numerical value of the first octet

Description : Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available? * 254 * 510 * 126 * 16,372

Last Answer : 254

Description : You have an IP host address of 201.222.5.121 and a subnet mask of 255.255.255.248. What is the broadcast address? * 201.222.5.127 * 201.222.5.120 * 201.222.5.121 * 201.222.5.122

Last Answer : Correct answer: A The easiest way to calculate this is to subtract 255.255.255.248 (subnet mask) from 255.255.255.255, this equals 7. Convert the address 201.222.5.121 to binary- ... mask 255.255.255.248 to binary-11111111 11111111 11111111 11111000. AND them together to get: 11001001 1101111

Description : You are given the following address: 15.16.193.6/21. Determine the subnet mask, address class, subnet address, and broadcast address. * 255.255.248.0, A, 15.16.192.0, 15.16.199.255 * 255.255.248.0, B, 15.16.192.0, ... 0, A, 15.16.199.255, 14.15.192.0 * 255.255.242.0, A, 15.16.192.0, 15.16.199.255

Last Answer : Correct answer: A,B & D Subnet addresses in this situation are all in multiples of 8. In this example, 201.222.5.16 is the subnet, 201.22.5.31 is the broadcast address. The rest are valid host IDs on subnet 201.222.5.16.

Description : You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address, and broadcast address. * 255.255.255.252, B,128.16.32.12, 128.16.32.15 * 255.255.255.252, C,128.16.32.12 ... , B,128.16.32.15, 128.16.32.12 * 255.255.255.248, B,128.16.32.12, 128.16.32.15

Last Answer : Correct answer: A * 255.255.255.248,

Description : You are given the following address: 153.50.6.27/25. Determine the subnet mask, address class, subnet address, and broadcast address. * 255.255.255.128, B,153.50.6.0, 153.50.6.127 * 255.255.255.128, C,153.50.6.0, 153 ... .128, C,153.50.6.127, 153.50.6.0 * 255.255.255.224, C,153.50.6.0, 153.50.6.127

Last Answer : Correct answer: A 255.255.255.224,

Description : When configuring the subnet mask for an IP address, which formats can be used? * dotted-decimal. * Hexadecimal * Bit-count * Octal * Binary

Last Answer : Correct answer: A, B &C

Description : how do i connect to a cisco wireless router using ubuntu?

Last Answer : how do i get my laptop to pickup my Cisco wireless router while using ubuntu. my laptop will not show wireless connect

Description : Determine from the following the basic mode of transmission system in the public data network in which data are transferred from the source to the network and from the network to the destination in the frame format. A. Voice mode B. Asynchronous mode C. Synchronous mode D. Packet mode

Last Answer : D. Packet mode

Description : Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is _____. a. 2 sec b. 3 sec c. 4 sec d. 1 sec

Last Answer : a. 2 sec

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : How to get an Open NAT using Wireless Adapter for Xbox 360?

Last Answer : answer:Go to www.portforward.com It will tell explain exactly what you need to do. Walshy

Description : how can i connect my usb & parallel port printers onto my existing LAN without using any pc and under very low costing.

Last Answer : how can i connect my usb & parallel port printers onto my existing LAN without using any pc and under very low costing. Can u help me?

Description : Using MacBook Pro as Network Bridge?

Last Answer : answer:If you have cable/dsl or any other high speed internet connection, I would suggest installing a router and just plugging your macbook and your 360 into the built in switch. Using the bridging method will add more headache than the money you’d save on a router/switch solution.

Description : Issue with my Cisco wireless router. Please send me in a direction!

Last Answer : Press the little reset button in the back for 25 seconds, let it restore to defaults and report back.

Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect

Last Answer : b. Communication Administratively Prohibited

Description : Any advice on networking for the first time at an event?

Last Answer : I think dressing fairly professionally would be a good way to go. As this is meeting people in a possible business capacity, it is important to look the part. I think if you just go up and introduce ... being asked for their advice. These after all, are the best people to give their advice to you.