Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

CCNA 2 v6 RSE Chapter 7 Exam Online

Last Updated on May 20, 2021 by Admin

CCNA 2 v6 RSE Chapter 7 Exam Online

RSE -- Chapter 7 Exam

Time limit: 0

Quiz-summary

0 of 24 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24

Information

RSE — Chapter 7 Exam

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 24 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  1. Answered
  2. Review
  1. Question 1 of 24
    1. Question
    1 points

    In which configuration would an outbound ACL placement be preferred over an inbound ACL placement?

    Correct

    Incorrect

    An outbound ACL should be utilized when the same ACL filtering rules will be applied to packets coming from more than one inbound interface before exiting a single outbound interface. The outbound ACL will be applied on the single outbound interface.

    Hint

    An outbound ACL should be utilized when the same ACL filtering rules will be applied to packets coming from more than one inbound interface before exiting a single outbound interface. The outbound ACL will be applied on the single outbound interface.

  2. Question 2 of 24
    2. Question
    1 points

    Which address is required in the command syntax of a standard ACL?

    Correct

    Incorrect

    The only filter that can be applied with a standard ACL is the source IP address. An extended ACL can use multiple criteria to filter traffic, such as source IP address, destination IP address, type of traffic, and type of message.

    Hint

    The only filter that can be applied with a standard ACL is the source IP address. An extended ACL can use multiple criteria to filter traffic, such as source IP address, destination IP address, type of traffic, and type of message.

  3. Question 3 of 24
    3. Question
    1 points

    Which statement describes a difference between the operation of inbound and outbound ACLs?

    Correct

    Incorrect

    With an inbound ACL, incoming packets are processed before they are routed. With an outbound ACL, packets are first routed to the outbound interface, then they are processed. Thus processing inbound is more efficient from the router perspective. The structure, filtering methods, and limitations (on an interface, only one inbound and one outbound ACL can be configured) are the same for both types of ACLs.

    Hint

    With an inbound ACL, incoming packets are processed before they are routed. With an outbound ACL, packets are first routed to the outbound interface, then they are processed. Thus processing inbound is more efficient from the router perspective. The structure, filtering methods, and limitations (on an interface, only one inbound and one outbound ACL can be configured) are the same for both types of ACLs.

  4. Question 4 of 24
    4. Question
    3 points

    Which three statements describe ACL processing of packets? (Choose three.)

    Correct

    Incorrect

    When a packet comes into a router that has an ACL configured on the interface, the router compares the condition of each ACE to determine if the defined criteria has been met. If met, the router takes the action defined in the ACE (allows the packet through or discards it). If the defined criteria has not been met, the router proceeds to the next ACE. An implicit deny any statement is at the end of every standard ACL.

    Hint

    When a packet comes into a router that has an ACL configured on the interface, the router compares the condition of each ACE to determine if the defined criteria has been met. If met, the router takes the action defined in the ACE (allows the packet through or discards it). If the defined criteria has not been met, the router proceeds to the next ACE. An implicit deny any statement is at the end of every standard ACL.

  5. Question 5 of 24
    5. Question
    1 points

    What single access list statement matches all of the following networks?
    192.168.16.0
    192.168.17.0
    192.168.18.0
    192.168.19.0

    Correct

    Incorrect

    The ACL statement access-list 10 permit 192.168.16.0 0.0.3.255 will match all four network prefixes. All four prefixes have the same 22 high order bits. These 22 high order bits are matched by the network prefix and wildcard mask of 192.168.16.0 0.0.3.255.

    Hint

    The ACL statement access-list 10 permit 192.168.16.0 0.0.3.255 will match all four network prefixes. All four prefixes have the same 22 high order bits. These 22 high order bits are matched by the network prefix and wildcard mask of 192.168.16.0 0.0.3.255.

  6. Question 6 of 24
    6. Question
    2 points

    A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)

    Correct

    Incorrect

    To permit or deny one specific IP address, either the wildcard mask 0.0.0.0 (used after the IP address) or the wildcard mask keyword host (used before the IP address) can be used.

    Hint

    To permit or deny one specific IP address, either the wildcard mask 0.0.0.0 (used after the IP address) or the wildcard mask keyword host (used before the IP address) can be used.

  7. Question 7 of 24
    7. Question
    1 points

    If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?

    Correct

    Incorrect

    In calculating how many ACLs can be configured, use the rule of “three Ps”: one ACL per protocol, per direction, per interface. In this case, 2 interfaces x 2 protocols x 2 directions yields 8 possible ACLs.

    Hint

    In calculating how many ACLs can be configured, use the rule of “three Ps”: one ACL per protocol, per direction, per interface. In this case, 2 interfaces x 2 protocols x 2 directions yields 8 possible ACLs.

  8. Question 8 of 24
    8. Question
    3 points

    Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)

    Correct

    Incorrect

    Extended ACLs should be placed as close as possible to the source IP address, so that traffic that needs to be filtered does not cross the network and use network resources. Because standard ACLs do not specify a destination address, they should be placed as close to the destination as possible. Placing a standard ACL close to the source may have the effect of filtering all traffic, and limiting services to other hosts. Filtering unwanted traffic before it enters low-bandwidth links preserves bandwidth and supports network functionality. Decisions on placing ACLs inbound or outbound are dependent on the requirements to be met.

    Hint

    Extended ACLs should be placed as close as possible to the source IP address, so that traffic that needs to be filtered does not cross the network and use network resources. Because standard ACLs do not specify a destination address, they should be placed as close to the destination as possible. Placing a standard ACL close to the source may have the effect of filtering all traffic, and limiting services to other hosts. Filtering unwanted traffic before it enters low-bandwidth links preserves bandwidth and supports network functionality. Decisions on placing ACLs inbound or outbound are dependent on the requirements to be met.

  9. Question 9 of 24
    9. Question
    1 points

    Refer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached to R1?

    CCNA 2 RSE 6.0 Chapter 7 Exam Answers 2018 2019 02
    CCNA 2 RSE 6.0 Chapter 7 Exam Answers 2018 2019 02

    Correct

    Incorrect

    Standard access lists only filter on the source IP address. In the design, the packets would be coming from the 192.168.10.96/27 network (the R2 G0/0 network). The correct ACL is access-list 1 permit 192.168.10.96 0.0.0.31.

    Hint

    Standard access lists only filter on the source IP address. In the design, the packets would be coming from the 192.168.10.96/27 network (the R2 G0/0 network). The correct ACL is access-list 1 permit 192.168.10.96 0.0.0.31.

  10. Question 10 of 24
    10. Question
    1 points

    Refer to the exhibit. If the network administrator created a standard ACL that allows only devices that connect to the R2 G0/0 network access to the devices on the R1 G0/1 interface, how should the ACL be applied?

    CCNA 2 RSE 6.0 Chapter 7 Exam Answers 2018 2019 03
    CCNA 2 RSE 6.0 Chapter 7 Exam Answers 2018 2019 03

    Correct

    Incorrect

    Because standard access lists only filter on the source IP address, they are commonly placed closest to the destination network. In this example, the source packets will be coming from the R2 G0/0 network. The destination is the R1 G0/1 network. The proper ACL placement is outbound on the R1 G0/1 interface.

    Hint

    Because standard access lists only filter on the source IP address, they are commonly placed closest to the destination network. In this example, the source packets will be coming from the R2 G0/0 network. The destination is the R1 G0/1 network. The proper ACL placement is outbound on the R1 G0/1 interface.

  11. Question 11 of 24
    11. Question
    1 points

    Refer to the following output. What is the significance of the 4 match(es) statement?

    R1# <output omitted>
    10 permit 192.168.1.56 0.0.0.7
    20 permit 192.168.1.64 0.0.0.63 (4 match(es))
    30 deny any (8 match(es))

    Correct

    Incorrect

    The show access-lists command shows how many packets have met the criteria for each ACE in terms of a specific number of “matches.”

    Hint

    The show access-lists command shows how many packets have met the criteria for each ACE in terms of a specific number of “matches.”

  12. Question 12 of 24
    12. Question
    1 points

    On which router should the show access-lists command be executed?

    Correct

    Incorrect

    The show access-lists command is only relevant to traffic passing through the router on which the ACL is configured.

    Hint

    The show access-lists command is only relevant to traffic passing through the router on which the ACL is configured.

  13. Question 13 of 24
    13. Question
    1 points

    What is the quickest way to remove a single ACE from a named ACL?

    Correct

    Incorrect

    Named ACL ACEs can be removed using the no command followed by the sequence number.

    Hint

    Named ACL ACEs can be removed using the no command followed by the sequence number.

  14. Question 14 of 24
    14. Question
    1 points

    An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

    Correct

    Incorrect

    Administrative access over SSH to the router is through the vty lines. Therefore, the ACL must be applied to those lines in the inbound direction. This is accomplished by entering line configuration mode and issuing the access-class command.

    Hint

    Administrative access over SSH to the router is through the vty lines. Therefore, the ACL must be applied to those lines in the inbound direction. This is accomplished by entering line configuration mode and issuing the access-class command.

  15. Question 15 of 24
    15. Question
    1 points

    Which type of router connection can be secured by the access-class command?

    Correct

    Incorrect

    Access to vty lines can be filtered with an ACL and applied using the access-class in command.

    Hint

    Access to vty lines can be filtered with an ACL and applied using the access-class in command.

  16. Question 16 of 24
    16. Question
    1 points

    Consider the following output for an ACL that has been applied to a router via the access-class in command. What can a network administrator determine from the output that is shown?

    R1# <output omitted>
    Standard IP access list 2
    10 permit 192.168.10.0, wildcard bits 0.0.0.255 (2 matches)
    20 deny any (1 match)

    Correct

    Incorrect

    The access-class command is used only on VTY ports. VTY ports support Telnet and/or SSH traffic. The match permit ACE is how many attempts were allowed using the VTY ports. The match deny ACE shows that a device from a network other than 192.168.10.0 was not allowed to access the router through the VTY ports.

    Hint

    The access-class command is used only on VTY ports. VTY ports support Telnet and/or SSH traffic. The match permit ACE is how many attempts were allowed using the VTY ports. The match deny ACE shows that a device from a network other than 192.168.10.0 was not allowed to access the router through the VTY ports.

  17. Question 17 of 24
    17. Question
    1 points

    Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?

    CCNA 2 RSE 6.0 Chapter 7 Exam Answers 2018 2019 05
    CCNA 2 RSE 6.0 Chapter 7 Exam Answers 2018 2019 05

    Correct

    Incorrect

    Because the new deny ACE is a host address that falls within the existing 172.16.0.0 network that is permitted, the router rejects the command and displays an error message. For the new deny ACE to take effect, it must be manually configured by the administrator with a sequence number that is less than 10.

    Hint

    Because the new deny ACE is a host address that falls within the existing 172.16.0.0 network that is permitted, the router rejects the command and displays an error message. For the new deny ACE to take effect, it must be manually configured by the administrator with a sequence number that is less than 10.

  18. Question 18 of 24
    18. Question
    1 points

    Refer to the exhibit. An ACL was configured on R1 with the intention of denying traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0/24. All other traffic into subnet 172.16.3.0/24 should be permitted. This standard ACL was then applied outbound on interface Fa0/0. Which conclusion can be drawn from this configuration?​

    CCNA 2 RSE 6.0 Chapter 7 Exam Answers 2018 2019 01
    CCNA 2 RSE 6.0 Chapter 7 Exam Answers 2018 2019 01

    Correct

    Incorrect

    Because of the implicit deny at the end of all ACLs, the access-list 1 permit any command must be included to ensure that only traffic from the 172.16.4.0/24 subnet is blocked and that all other traffic is allowed.​

    Hint

    Because of the implicit deny at the end of all ACLs, the access-list 1 permit any command must be included to ensure that only traffic from the 172.16.4.0/24 subnet is blocked and that all other traffic is allowed.​

  19. Question 19 of 24
    19. Question
    1 points

    Refer to the exhibit. What will happen to the access list 10 ACEs if the router is rebooted before any other commands are implemented?

    CCNA 2 RSE 6.0 Chapter 7 Exam Answers 2018 2019 04
    CCNA 2 RSE 6.0 Chapter 7 Exam Answers 2018 2019 04

    Correct

    Incorrect

    After a reboot, access list entries will be renumbered to allow host statements to be listed first and thus more efficiently processed by the Cisco IOS.​

    Hint

    After a reboot, access list entries will be renumbered to allow host statements to be listed first and thus more efficiently processed by the Cisco IOS.​

  20. Question 20 of 24
    20. Question
    1 points

    What is the effect of configuring an ACL with only ACEs that deny traffic?

    Correct

    Incorrect

    Because there is a deny any ACE at the end of every standard ACL, the effect of having all deny statements is that all traffic will be denied regardless of the direction in which the ACL is applied.

    Hint

    Because there is a deny any ACE at the end of every standard ACL, the effect of having all deny statements is that all traffic will be denied regardless of the direction in which the ACL is applied.

  21. Question 21 of 24
    21. Question
    1 points

    Which type of ACL statements are commonly reordered by the Cisco IOS as the first ACEs?

    Correct

    Incorrect

    ACEs are commonly reordered from the way they were entered by the network administrator. The ACEs that have host criteria such as in the statement permit host 192.168.10.5, are reordered as the first statements because they are the most specific (have the most number of bits that must match).

    Hint

    ACEs are commonly reordered from the way they were entered by the network administrator. The ACEs that have host criteria such as in the statement permit host 192.168.10.5, are reordered as the first statements because they are the most specific (have the most number of bits that must match).

  22. Question 22 of 24
    22. Question
    1 points

    A network administrator is configuring an ACL to restrict access to certain servers in the data center. The intent is to apply the ACL to the interface connected to the data center LAN. What happens if the ACL is incorrectly applied to an interface in the inbound direction instead of the outbound direction?

    Correct

    Incorrect

    Always test an ACL to ensure that it performs as it was designed. Applying an ACL that is applied using the ip access-group in command instead of using the ip access-group out command is not going to work as designed.

    Hint

    Always test an ACL to ensure that it performs as it was designed. Applying an ACL that is applied using the ip access-group in command instead of using the ip access-group out command is not going to work as designed.

  23. Question 23 of 24
    23. Question
    1 points

    When would a network administrator use the clear access-list counters command?

    Correct

    Incorrect

    The clear access-list counters command is used to reset all numbers relating to ACE match conditions that have been made within a particular ACE. The command is useful when troubleshooting an ACL that has recently been deployed.

    Hint

    The clear access-list counters command is used to reset all numbers relating to ACE match conditions that have been made within a particular ACE. The command is useful when troubleshooting an ACL that has recently been deployed.

  24. Question 24 of 24
    24. Question
    5 points

    Match each statement with the example subnet and wildcard that it describes. (Not all options are used.)

     

    Sort elements
    • 192.168.15.65 255.255.255.240
    • 192.168.15.144 0.0.0.15
    • host 192.168.15.12
    • 192.168.5.0 0.0.3.255
    • 192.168.3.64 0.0.0.7
    • 192.168.100.63 255.255.255.192
    • the first valid host address in a subnet
      • subnetwork address of a subnet with 14 valid host addresses
        • all IP address bits must match exactly
          • hosts in a subnet with the subnet mask 255.255.252.0
            • addresses with a subnet mask of 255.255.255.248
              Correct

              Incorrect

              Converting the wildcard mask 0.0.3.255 to binary and subtracting it from 255.255.255.255 yields a subnet mask of 255.255.252.0.
              Using the host parameter in a wildcard mask requires that all bits match the given address.
              192.168.15.65 is the first valid host address in a subnetwork beginning with the subnetwork address 192.168.15.64. The subnet mask contains 4 host bits, yielding subnets with 16 addresses.
              192.168.15.144 is a valid subnetwork address in a similar subnetwork. Change the wildcard mask 0.0.0.15 to binary and subtract it from 255.255.255.255, and the resulting subnet mask is 255.255.255.240.
              192.168.3.64 is a subnetwork address in a subnet with 8 addresses. Convert 0.0.0.7 to binary and subtract it from 255.255.255.255, and the resulting subnet mask is 255.255.255.248. That mask contains 3 host bits, and yields 8 addresses.

              Hint

              Converting the wildcard mask 0.0.3.255 to binary and subtracting it from 255.255.255.255 yields a subnet mask of 255.255.252.0.
              Using the host parameter in a wildcard mask requires that all bits match the given address.
              192.168.15.65 is the first valid host address in a subnetwork beginning with the subnetwork address 192.168.15.64. The subnet mask contains 4 host bits, yielding subnets with 16 addresses.
              192.168.15.144 is a valid subnetwork address in a similar subnetwork. Change the wildcard mask 0.0.0.15 to binary and subtract it from 255.255.255.255, and the resulting subnet mask is 255.255.255.240.
              192.168.3.64 is a subnetwork address in a subnet with 8 addresses. Convert 0.0.0.7 to binary and subtract it from 255.255.255.255, and the resulting subnet mask is 255.255.255.248. That mask contains 3 host bits, and yields 8 addresses.

            • CCNA1 v7
            • CCNA2 v7
            • CCNA3 v7
            System Test Exam Answers
            Modules 1 – 3 Exam Answers
            Modules 4 – 7 Exam Answers
            Modules 8 – 10 Exam Answers
            Modules 11 – 13 Exam Answers
            Modules 14 – 15 Exam Answers
            Modules 16 – 17 Exam Answers
            Practice Final – ITN Answers
            Course Feedback
            ITN Practice PT Skills Assessment (PTSA)
            Final Exam Answers
            Modules 1 – 4 Exam Answers
            Modules 5 – 6 Exam Answers
            Modules 7 – 9 Exam Answers
            Modules 10 – 13 Exam Answers
            Modules 14 – 16 Exam Answers
            ITN Practice Skills Assessment – PT Answers
            SRWE Practice Skills Assessment – PT Part 1 Answers
            SRWE Practice Skills Assessment – PT Part 2 Answers
            SRWE Hands On Skills Exam Answers
            SRWE Practice Final Exam Answers
            SRWE Final Exam Answers 
            Modules 1 – 2 Exam Answers
            Modules 3 – 5 Exam Answers
            Modules 6 – 8 Exam Answers
            Modules 9 – 12 Exam Answers
            Modules 13 – 14 Exam Answers
            ITN Practice PT Skills Assessment (PTSA) Answers
            SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
            SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
            ENSA Practice PT Skills Assessment (PTSA) Answers
            ENSA Hands On Skills Exam Answers
            Practice Final – ENSA Answers
            ENSA Final Exam Answers
            CCNA Certification Practice Exam Answers

            Copyright © 2023 PressExam.