Add Book to My BookshelfPurchase This Book Online

Chapter 16 - IP Access Lists

Cisco & IP Addressing
Louis D. Rossi, Louis R. Rossi and Thomas Rossi
  Copyright © 1999 The McGraw-Hill Companies, Inc.

Exercises
  16.1: What type of access list may save on bandwidth and processing?
  16.2: What key information can a standard list identify?
  16.3: What key information can a extended list identify?
  16.4: Where will a standard list most likely be placed?
  16.5: Where will an extended list most likely be placed?
  16.6: Access lists may be used when defining traffic to place a call. (T/F)
  16.7: What port number identifies FTP?
  16.8: If a 10-line access list is configured, how many lines actually make up the list?
  16.9: A protocol does not need to be configured in an extended list. (T/F)
  16.10: A port number does not need to be configured in an extended list. (T/F)

 


 
Books24x7.com, Inc © 2000 –  Feedback