Home > CCNA – Access List Questions 2

CCNA – Access List Questions 2

April 30th, 2011 Go to comments

Here you will find answers to Access list Questions – Part 2

Note: If you are not sure about Access list, please read my Access list tutorial.

Question 1

Refer to the exhibit. What will happen to HTTP traffic coming from the Internet that is destined for 172.16.12.10 if the traffic is processed by this ACL?

router#show access-lists
Extended IP access list 110
10 deny tcp 172.16.0.0 0.0.255.255 any eq telnet
20 deny tcp 172.16.0.0 0.0.255.255 any eq smtp
30 deny tcp 172.16.0.0 0.0.255.255 any eq http
40 permit tcp 172.16.0.0 0.0.255.255 any

A. Traffic will be dropped per line 30 of the ACL.
B. Traffic will be accepted per line 40 of the ACL.
C. Traffic will be dropped, because of the implicit deny all at the end of the ACL.
D. Traffic will be accepted, because the source address is not covered by the ACL.


Answer: C

Explanation

The syntax of an extended access list is:

access-list access-list-number {permit | deny} protocol source {source-mask} destination {destination-mask} [eq destination-port]

Notice that in our access list, the network 172.16.0.0 0.0.255.255 is specified as the source but the question asks about “HTTP traffic coming from the Internet that is destined for 172.16.12.10″, which means 172.16.0.0 0.0.255.255 is the destination network. So in this case there is no match in our access list and the traffic will be dropped because of the implicit deny all at the end of the ACL. It is surely a tricky question!

Question 2

Refer to the exhibit. Which statement describes the effect that the Router1 configuration has on devices in the 172.16.16.0 subnet when they try to connect to SVR-A using Telnet or SSH?

extended_access_list.jpg

A. Devices will not be able to use Telnet or SSH.
B. Devices will be able to use SSH, but not Telnet.
C. Devices will be able to use Telnet, but not SSH.
D. Devices will be able to use Telnet and SSH.


Answer: B

Explanation

Let’s analyze the access list 100:

+ 10 permit tcp 172.16.16.0 0.0.0.15 host 172.16.48.63 eq 22: allows TCP traffic from network 172.16.16.0/28 to access host 172.16.48.63 with a destination port of 22 (SSH)
+ 20 permit tcp 172.16.16.0 0.0.0.15 eq telnet host 172.16.48.63: allows TCP traffic from network 172.16.16.0/28 with a source port of 23 (telnet) to access host 172.16.48.63

Notice that if a device wants to telnet (or SSH) to SVR-A server it must use the destination port of 23 (or 22), not a source port of 23 (or 22).

Access list 100 is applied on the inbound direction of Fa0/0 so it will only filter traffic from 172.16.16.0 subnet to the SVR-A server.

Access list 101 is very similar to access list 100 but it is applied on the inbound direction of Fa0/1 so it will filter traffic from SVR-A server to 172.16.16.0 subnet. In ACL 101:

+ 10 permit tcp host 172.16.48.63 eq 22 172.16.16.0 0.0.0.15: allows TCP traffic from host 172.16.48.63 with a source port of 22 (SSH) to access network 172.16.16.0/28.
+ 20 permit tcp host 172.16.48.63 172.16.16.0 0.0.0.15 eq telnet: allows TCP traffic from host 172.16.48.63 to access network 172.16.16.0/28 with a destination port of telnet.

Notice that the returned traffic from SVR-A to network 172.16.16.0/28 (resulting from telnet or SSH session) will have a source port of 23 (Telnet) or 22 (SSH)

In conclusion, the first statements of each ACL will allow devices to “SSH” to SVR-A. But they can’t telnet because of the implicit deny all at the end of the ACL.

In this question, the second statements of each ACL can be considered “wrong” if we intend to filter telnet or SSH traffic and they have no effect on the Telnet or SSH traffic.

Question 3

Refer to the exhibit. Which three variables (router, protocol port, and router ACL direction) apply to an extended ACL that will prevent student 01 from securely browsing the internet?

Apply_acess_list.jpg

A. OUT
B. Router 3
C. HTTPS
D. IN
E. Router 1


Answer: B C D

Explanation

There are 3 routers we can place this access list: Router 1, Router Main and Router 3 but in theory, an extended access list should be placed close to the source -> Router 3 is the best choice -> B is correct.

The traffic we need to filter here is “securely browsing the internet” so it is HTTPS -> C is correct.

Finally we should apply this access list to the inbound direction so that Router 3 will filter this traffic before making routing decision. It helps save processing resources on Router 3 -> D is correct.

Question 4

Which two statements apply to dynamic access lists? (choose two)

A. they offer simpler management in large internetworks.
B. you can control logging messages.
C. they allow packets to be filtered based on upper-layer session information.
D. you can set a time-based security policy.
E. they provide a level of security against spoofing.
F. they are used to authenticate individual users.


Answer: A F

Explanation

Dynamic ACLs have the following security benefits over standard and static extended ACLs:
+ Use of a challenge mechanism to authenticate individual users
+ Simplified management in large internetworks
+ In many cases, reduction of the amount of router processing that is required for ACLs
+ Reduction of the opportunity for network break-ins by network hackers
+ Creation of dynamic user access through a firewall, without compromising other configured security restrictions

(Reference: CCNA Exploration 4 – Dynamic ACLs)

Question 5

Which command shows if an access list is assigned to an interface?

A. show ip interface [interface] access-lists
B. show ip access-lists interface [interface]
C. show ip interface [interface]
D. show ip access-lists [interface]


Answer: C

Explanation

The output of “show ip interface [interface]” command is shown below:

show_ip_interface.jpg

In the output we can see the access list 1 is applied to this interface on inbound direction.

Question 6

Which item represents the standard IP ACL?

A. access-list 50 deny 192.168.1.1 0.0.0.255
B. access-list 110 permit ip any any
C. access-list 2500 deny tcp any host 192.168.1.1 eq 22
D. access-list 101 deny tcp any host 192.168.1.1


Answer: A

Explanation

The standard access lists are ranged from 1 to 99 and from 1300 to 1999 so only access list 50 is a standard access list.

Question 7

Which statement about access lists that are applied to an interface is true?

A. you can apply only one access list on any interface
B. you can configure one access list, per direction, per layer 3 protocol
C. you can place as many access lists as you want on any interface
D. you can configure one access list, per direction, per layer 2 protocol


Answer: B

Explanation

We can have only 1 access list per protocol, per direction and per interface. It means:

+ We can not have 2 inbound access lists on an interface
+ We can have 1 inbound and 1 outbound access list on an interface

Question 8

A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the internet. Which ACL can be used?

A. reflexive
B. extended
C. standard
D. dynamic


Answer: D

Explanation

We can use a dynamic access list to authenticate a remote user with a specific username and password. The authentication process is done by the router or a central access server such as a TACACS+ or RADIUS server. The configuration of dynamic ACL can be read here: http://www.cisco.com/en/US/tech/tk583/tk822/technologies_tech_note09186a0080094524.shtml

Question 9

Which parameter standard access list takes into consideration for traffic filtering decisions?

A. Source MAC address
B. Destination IP address
C. Destination MAC address
D. Source IP address


Answer: D

Question 10

In which solution is a router ACL used?

A. protecting a server from unauthorized access
B. controlling path selection, based on the route metric
C. reducing router CPU utilization
D. filtering packets that are passing through a router


Answer: D


Comments (379) Comments
Comment pages
1 2 3 4 5 6 8 981
  1. jpmarinm
    June 6th, 2012

    @ SIMBA

    what you need to do first in the question is a summarization:
    The normal masks for these networks are as below:

    172.29.16.0 255.255.255.0
    172.29.17.0 255.255.255.0
    172.29.18.0 255.255.255.0
    172.29.19.0 255.255.255.0

    Now taking into consideration the third octect (where the changes take place):

    128 64 32 16 8 4 2 1
    0 0 0 1 0 0 0 0 – 16
    0 0 0 1 0 0 0 1 – 17
    0 0 0 1 0 0 1 0 – 18
    0 0 0 1 0 0 1 0 – 19

    Look that only the las 2 bits 2 and 1 change to for the networks, bits from 128 to 4 remain the same… that means that we can use the following mask that will take into consideration ONLY the those networks..

    172.29.16.0 255.255.252.0

    with that you can figure out the wildcard use the following method:

    255.255.255.255
    (minus) – 255.255.252. 0
    ———————-
    0 . 0 . 3 . 255

    The answer will be:

    c. access-list 10 permit 172.29.16.0 0.0.3.255

    I hope this helps…

  2. Mike M.
    June 7th, 2012

    Ok, I know this was asked before by Jayesh, but I’m a little confused by Muthu’s response because can only choose two answers.

    Who is correct, 9tut or jericho?

  3. Mike M.
    June 7th, 2012

    Sorry, this pertains to question 4

    Question 4

    Which two statements apply to dynamic access lists? (choose two)

    A. they offer simpler management in large internetworks.
    B. you can control logging messages.
    C. they allow packets to be filtered based on upper-layer session information.
    D. you can set a time-based security policy.
    E. they provide a level of security against spoofing.
    F. they are used to authenticate individual users.

    Answer: A F

  4. Esteban
    June 13th, 2012

    Question 3 states to keep student 1 off the internet with HTTPS. If we apply the extended access list to the interface closest to student 01 as we should by convention, then student 1 cannot open a https connection to the servers on our LAN either. So would it not be better to put a out statement on the connection to the internet? Or would we instead add a permit statement on the interface close to the student to allow them internal lan https? Seems like the first choice would be less work so this case problem confuses me…

  5. fatma
    June 17th, 2012

    hi can any one send me the latest dumps (fatma.thabet.89@gmail.com)

  6. mohamed
    June 19th, 2012

    hello, plz send me latest dump
    email (bido_love41@yahoo.com)
    pllllllllllllz i have exam after 5 days

  7. johny
    June 20th, 2012

    hi can any one send me the latest dumps (jonykhoury@hotmail.com)

  8. God’s Grace
    June 21st, 2012

    @Mohamed @Johny go to http://www.examcollection.com.Read the comments on different dump to find the lastet ones to use. I pass my ccna exam today ! As of 6/20/2012, the following dumps are still valid

    Cisco ActualTests 640-802 v2012-02-26 by Jericho 632q.vce
    Cisco Acme 640-802 v2012-04-18 by Collisio 487q.vce

    Hope this helps!

  9. rodney
    June 21st, 2012

    Question 8

    the answer is reflexive acl check the correct answer not dynamic

  10. TDy
    June 24th, 2012

    Muthu,

    I do think you are right.
    The ACL, as a general rule eare to be placed as close as possible to the source of the traffic that is denied/allow. Standard ACL should be placed as close to the destination as possible.

    But: if the student wants to connect to Srv 1 or Srv 2 using HTTPS, then the ACL would be wrong put.

    the second “but”: in the questions it is stated only what we need to know and we have to make a decision based on that so the right answer would be “B, C and D”.

  11. Pheryl
    June 28th, 2012

    Hey guys, xallax and 9tut admin,

    Q2 is a very tricky question.

    9tut did too many explanation regarding the answer, however, we can point out from the tricky question and from the exhibit, we can conlude that “access-list 101″ will not be included anymore when we analyze the question because it only asked for the “host in 172.16.16.0 subnet to connect to SVR-A”, we only consider “left-to-right” direction, we don’t care about “right-to-left”. so by looking at access-list 100 we can finally conclude that only SSH is allowed, second line is an invalid statement because a host can only establish telnet connection with a destination port number 23 not a source port number 23.

  12. Kris
    June 28th, 2012

    Heloo people I pass the exam with 960 on 27 this moht the questions are from 9tut and I study from Cisco.ActualTest.640-802.v2012-02-26.by.Jericho.632q .vce the simulations are acl2,eigrp,vtp the same from 9tut with difrent ip addresss. Thahks to 9tut

  13. Wennie
    June 30th, 2012

    @Kris
    you only studied Jericho dump?

  14. geedub
    July 1st, 2012

    well — I finally scheduled the test for tomorrow

  15. pkb
    July 5th, 2012

    Q2: No option is correct if implicit deny come into picture

    SSH should be denied due to implicit deny.

  16. kmi
    July 15th, 2012

    hi kris, thank God u passed d exam , please help forward ur dumps to my mail. kmlydd2007@yahoo.co.uk. thanks

  17. Layer13
    July 20th, 2012

    Dear all,

    can anybody put right access-list for this request, please?

    Host C needed to get web (HTTP) access to the Finance server
    No other traffic from Host C should be allowed to the finance server
    No traffic from the LAN or core should be allowed to the finance server
    All hosts in the core and LAN should be able to access the Public web server (did not state protocol)

    Please notice that IP address of Public Server is unknown.

    Thank you.

  18. criniks
    July 23rd, 2012

    i am appearing ccna exam on coming friday 27th and m only following Jericho dumps is that enough please reply as soon as possible have little time for preparation thanks

  19. criniks
    July 23rd, 2012

    reply plzzz

  20. Anonymous
    July 25th, 2012

    please someone tell me that in ACL we deny the traffic through Interface……so is there any other way or place in which we can deny traffic…>>>>>>> plz help me

  21. Alboma
    July 26th, 2012

    Hi Anonymous,
    ACL do the filtering decision based on the IP addresses. If the physical interface has no IP address and the subinterface has IP address, you put the ACL to that subinterface. Is that what u are asking?

  22. Alboma
    July 26th, 2012

    Hi criniks, make sure you know the material and concepts behind them, before following the dumps! I myself passed ICND1 last October, and I’m going to take ICND2 tomorrow. I took this approach because I failed CCNA before, and I realize one-take approach is too much for me. I use Odom’s books and the included network simulator to study. I found out about this site and now come here often. Dumps may help only when you know the material and want to enforce your memory and knowledge, but don’t rely on them totally!

  23. Madhu
    July 31st, 2012

    Only questions Without giving notes,its not good..
    That too Questions are very less…

  24. Confused gal
    July 31st, 2012

    I want to thank 9tut and everyone here for his or her contribution. My challenge is that i don’t access-list to my satisfaction no matter the way it is explained most especially the direction of the traffic as in inbound or outbound. I am sitting for the exam next week.
    Anticipating your candid reply.

  25. geedub
    August 2nd, 2012

    confused gal —- access lists are on the exam — you need to understand them

  26. Muditha
    August 4th, 2012

    are Dynamic access lists in the syllabus ? will we get configurations from them too ?

  27. Alboma
    August 4th, 2012

    Hi Muditha, the syllabus only mentions ‘describe the purpose and types of ACLs’ And Odom ICND2 book only put dynamic ACL (aka lock-and-key security) in the misc topic with a small section. So I guess we dont have to study the config, for now.

  28. Sarwar
    August 6th, 2012

    i am confused about Question NO 4 .

    9tut say correct answer are A,F

    But in dump of Collisio ,jericho the answer is D,F

    Who is correct? tell me thank u.

  29. Alboma
    August 7th, 2012

    Hi Sarwar, I think it’s safe to say D is not correct as there’s another type of ACL available, i.e. time-based ACL

  30. sivabalan
    August 11th, 2012

    Q.4) when i went through acl’s i found that “you can set a time-based security policy.” is also an benefit of dynamic acl ?
    is that right ?

  31. NAZ CCIE
    August 14th, 2012

    SOME ANSWERS HERE ARE WRONG

  32. 9tut
    August 14th, 2012

    @NAZ CCIE: Please tell me which questions are wrong?

  33. messinah
    August 15th, 2012

    @aJmAL
    Define In, Out, Inbound, Outbound, Source, and Destination
    This topic is very simple if u draws it from the following scenario
    The router uses the terms in, out, source, and destination as references. Traffic on the router can be compared to traffic on the highway. If you were a law enforcement officer in Pennsylvania and wanted to stop a truck going from Maryland to New York, the source of the truck is Maryland and the destination of the truck is New York. The roadblock could be applied at the Pennsylvania–New York border (out) or the Maryland–Pennsylvania border (in). replace with town/cities which u are familiar with.
    When you refer to a router, these terms have these meanings.
    • Out—Traffic that has already been through the router and leaves the interface. The source is where it has been, on the other side of the router, and the destination is where it goes.
    • In—Traffic that arrives on the interface and then goes through the router. The source is where it has been and the destination is where it goes, on the other side of the router.
    • Inbound —if the access list is inbound, when the router receives a packet, the Cisco IOS software checks the criteria statements of the access list for a match. If the packet is permitted, the software continues to process the packet. If the packet is denied, the software discards the packet.
    • Outbound—if the access list is outbound, after the software receives and routes a packet to the outbound interface, the software checks the criteria statements of the access list for a match. If the packet is permitted, the software transmits the packet. If the packet is denied, the software discards the packet.
    The in ACL has a source on a segment of the interface to which it is applied and a destination off of any other interface. The out ACL has a source on a segment of any interface other than the interface to which it is applied and a destination off of the interface to which it is applied.
    I just hope that u will grasp one or two things from this scenario.
    9tut help me if I am giving this man poison
    @9tut
    Thnks 4yo valuable website, ques, answers & explanations
    Hie all aspiring CCNA network engineers and already in the field?
    Can any one send me the vce engine software (Visual CertExam Suite) and dumbs from collision 486q by Jericho 632q or Bruce 564q by DHAKANI 615Q. I tried to google the vce engine, but got a trial version which only exhibited five questions.
    My id is musinawellaz@gmail.com
    Pliz help- I am preparing for ccna final exam on this month end (August 2012),so pliz again send me latest dumbs from collision 486q by Jericho 632q or Bruce 564q by DHAKANI 615Q.

  34. Klauss
    August 21st, 2012

    Here is another site that provides some details at times. It may fit someone learning style:
    http://www.freeccnaworkbook.com/labs/

  35. jacsatx
    August 29th, 2012

    DID IT!!…907…thx 9tut!!!!..CCNA certified….tons of questions from this site…read from top to bottom every question, because you will not know what pops up..q5 on exam…good luck to all!!

  36. Dax
    September 4th, 2012

    Q1 – again I hope not a real exam question unless the structure is wrong here.

    Here we have to assume plenty, assume that because we have the source and it is a private range we are therefore using the access list to block or allow certain traffic out of the local network to the web. So that means this ACL could be applied in bound on the internal interface or outbound on the external interface, because it is extended I would put it on the internal interface. Now that we have assumed the placement I would say assuming an appropriate static NAT is in place the web traffic would hit out routers outside interface make its way to the desired destination host (internal) no impact, however the return voyage will encounter the ACL on the inbound interface. Now the catch: “http” is not a valid entry, it should be “web” or 80. So we can ignore line 30 (which the IOS would never have allowed to be entered) and as such the permit 172.16.0.0/16 to Any will apply and the round trip would be a success. In truth there is no correct answer, I think line 30 is a typo, probably meant to be 80 or web.

    Tested this in Packet Tracer to confirm.

  37. zaki
    September 5th, 2012

    super sites

    please send me ccna interview dumps.
    thank you

    zakialam125@yahoo.com

  38. elvis
    September 5th, 2012

    please am writing ccna nextweek. please help with vita info. thanks

  39. jef
    September 8th, 2012

    @all anyone see this in exam?Question 4

    Which two statements apply to dynamic access lists? (choose two)

    A. they offer simpler management in large internetworks.
    B. you can control logging messages.
    C. they allow packets to be filtered based on upper-layer session information.
    D. you can set a time-based security policy.
    E. they provide a level of security against spoofing.
    F. they are used to authenticate individual users.

    Answer: A F

    dumps answers are D and F thanks

  40. mh
    September 9th, 2012

    On question 1: In line 30 of the ACL, isn’t 172.16.12.10 within the address block of 172.16.0.0/16? Wouldn’t the specified wildcard mask make it 172.16.0.0-172.16.255.255? I figured since ACLs filter traffic from first entry through the last entry, then followed by the implicit deny that line 30 would catch HTTP traffic before the implicit deny would.

  41. mh
    September 9th, 2012

    I understand question 1 now. I was briefly confused on ACL command syntax. Thanks

  42. Ashol
    September 10th, 2012

    Pls, can somebody send me the latest dumps, i have exam this month,
    my email is asholet98@hotmail.com
    Thanks

  43. smart86
    September 14th, 2012

    @xallax

    Refer to following command: access-list permit ip 10.4.4.0 0.0.0.255 any

    What would be the effect of issuing the command ip access-group 114 in to the fa0/0 interface?

    A-Attempts to telnet to the router would fail.
    B-It would allow all traffic from the 10.4.4.0 network.
    C-IP traffic would be passed through the Interface but TCP and UDP traffic would not.
    D-Routing protocol updates for the 10.4.4.0 network would not be accepted from the fa0/0 interface
    the correct answer is B or C

    what well be the answer if the question change to:

    What would be the effect of issuing the command ip access-group 114 out to the fa0/0 interface?

  44. xallax
    September 15th, 2012

    @smart86
    access-list 114 permit ip 10.4.4.0 0.0.0.255 any
    allow everything that has a source of 10.4.4.0/24 and goes to anywhere
    ip access-group 114 out
    allows all outgoing traffic that come from 10.4.4.0/24
    ip access-group 114 in
    allows all incoming traffic that come from 10.4.4.0/24

    notice the 2 keywords IN and OUT

  45. smart86
    September 15th, 2012

    @xallax

    so the correct answer as your explanation well be

    B for: ( ip access-group 114 in to the fa0/0 interface)

    & A for: (ip access-group 114 out to the fa0/0 interface)

    is it true

  46. smart86
    September 15th, 2012

    in above i mean C not A for: (ip access-group 114 out to the fa0/0 interface)

  47. smart86
    September 16th, 2012

    @xallax.

    please verfiy me if i’m corect or not in :

    B for: ( ip access-group 114 in to the fa0/0 interface)

    & C for: (ip access-group 114 out to the fa0/0 interface)

    is it true

    and how about this question:

    which layer of osi modal does IPsec operate?

    network
    transport
    session
    application
    in the dumps they choose transport but I think it is in network layer

  48. xallax
    September 16th, 2012

    @smart86
    A-Attempts to telnet to the router would fail.
    this is true only if you block the telnet port (23). this is not the case
    B-It would allow all traffic from the 10.4.4.0 network.
    “FROM”. this is true as the direction for the applied ACL is IN
    C-IP traffic would be passed through the Interface but TCP and UDP traffic would not.
    IP = TCP+UDP. you can’t have just IP traffic without TCP and UDP. false
    D-Routing protocol updates for the 10.4.4.0 network would not be accepted from the fa0/0 interface
    there is nothing said about routing updates, the only information given is about passing traffic from a certain source. false

    if the direction was OUT then B would still be correct.
    it would allow to exit all packets that come from 10.4.4.0/24. this also means “It would allow all traffic from the 10.4.4.0 network”

  49. xallax
    September 16th, 2012

    @smart86
    as per wikipedia:
    “IPsec is an end-to-end security scheme operating in the Internet Layer of the Internet Protocol Suite.”
    Internet Layer in the TCP/IP model is equal to the Network Layer in the OSI model.

    you are correct, the first option is correct

  50. Barry
    September 16th, 2012

    Question 1.
    Would that access list not be configured on an outbound interface? To deny parts of the 172.16.0.0 Network out. I didn’t think the internet would be processed by this access list as the internet would need an inbound access list? I would have chosen
    D. Traffic will be accepted, because the source address is not covered by the ACL.

Comment pages
1 2 3 4 5 6 8 981
Add a Comment