Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. (TCO 6) What function describes the use of an access control list? (Points :

ID: 3572504 • Letter: 1

Question

1. (TCO 6) What function describes the use of an access control list? (Points : 2)        ACLs control which user can access what services on the Internet.
       It is always preferred to use Extended ACLs since they are more flexible.
       ACLs should always be placed close to the source to avoid waste of computing resources.
       ACLs can be used to filter private IP addresses.
       ACLs help protect an organization's physical infrastructure.

Pool 2 – 3:1; 2 points; address TCO 6
Type: MC

       Extended outbound ACLs must exit the ingress interface.
       Standard and Extended inbound ACLs can filter based on source ports.
       Extended inbound ACLs can filter based on encryption key length.
       Standard and Extended outbound ACLs can filter based on source IP addresses.
       Answers B and C are correct.

Type: MC

Question 2. 2. (TCO 6) What is a possible use of an access control list in an enterprise network? (Points : 2)        Reducing inout buffer to ensure protection against denial of service
       Limiting access to physical server farm areas
       Controlling requests to file services
       Extending compute resources to ensure data protection
       Controlling virtual terminal access to routers

Type: MC

Explanation / Answer

Answer :

Question 2. 2. (TCO 6) What is a possible use of an access control list in an enterprise network? (Points : 2)

Reducing inout buffer to ensure protection against denial of service
       Limiting access to physical server farm areas
       Controlling requests to file services
       Extending compute resources to ensure data protection
       Controlling virtual terminal access to routers

Answer :

Controlling virtual terminal access to routers

Explanation :

Controlling virtual terminal access to routers is a possible use of an access control list in an enterprise network.

.............

Question 3. 3. (TCO 6) Which statement describes a characteristic of standard IPv4 ACLs? (Points : 2)

They are configured in the interface configuration mode.
       They can only filter traffic in the egress interface.
       They filter traffic based on source IP addresses only.
       They can only be applied with the ip access-class command.
       They are limited to filter only destination addresses.


Answer :

They filter traffic based on source IP addresses only.

Explanation :

They filter traffic based on source IP addresses only statement describes a characteristic of standard IPv4 ACLs.A standard IPv4 ACL can filter traffic based on source IP addresses only. Unlike an extended ACL, it cannot filter traffic based on Layer 4 ports. However, both standard and extended ACLs can be identified with either a number or a name, and both are configured in global configuration mode.

..................

Question 11. 11. (TCO 6) Unlike IPv4 ACLs, IPv6 ACLs do not use _____. (Points : 2)

destination IPv6 addresses
       operators
       widcard masks
       port numbers
       None of the above

Answer :

widcard masks

Explanation :

Unlike IPv4 ACLs, IPv6 ACLs do not use wildcard masks. Instead, the prefix-length is used to indicate how much of an IPv6 source or destination address should be matched.

...............

....................