Chapter 16 - IP Access Lists
Cisco & IP Addressing
Louis D. Rossi, Louis R. Rossi and Thomas Rossi
Copyright © 1999 The McGraw-Hill Companies, Inc.
Exercises
16.1:
What type of access list may save on bandwidth and processing?
16.2:
What key information can a standard list identify?
16.3:
What key information can a extended list identify?
16.4:
Where will a standard list most likely be placed?
16.5:
Where will an extended list most likely be placed?
16.6:
Access lists may be used when defining traffic to place a call. (T/F)
16.7:
What port number identifies FTP?
16.8:
If a 10-line access list is configured, how many lines actually make up the list?
16.9:
A protocol does not need to be configured in an extended list. (T/F)
16.10:
A port number does not need to be configured in an extended list. (T/F)
Books24x7.com, Inc © 2000 –
Feedback