what direction should the access list be placed to most efficiently implement this list?
An access list has been designed to prevent Telnet traffic from the Graphics Department from
reaching the HR server attached to the Eastfield router but allow Telnet traffic to other
destinations. Given the following access list:
access-list 101 deny tcp any any eq 23
permit ip any any
On which router, interface, and in what direction should the access list be placed to most efficiently
implement this list? (Choose three.)
Which form of NAT maps multiple private IP addresses to a single registered IP address by using different port
Which form of NAT maps multiple private IP addresses to a single registered IP address by using
different ports?
Which group of commands would be the best choice to allow only the IP address 172.16.3.3 to have Telnet access
Unauthorized users have used Telnet to gain access to a company router. The network
administrator wants to configure and apply an access list to allow Telnet access to the router, but
only from the network administrator’s computer. Which group of commands would be the best
choice to allow only the IP address 172.16.3.3 to have Telnet access to the router?
What command sequence will enable PAT from the inside to outside network?
Which two statements about static NAT translations are true?
Which two statements about static NAT translations are true? (Choose two.)
What does this mean?
The output of the show frame-relay pvc command shows “PVC STATUS = INACTIVE”. What does
this mean?
What are three reasons that an organization with multiple branch offices and roaming users might implement a C
What are three reasons that an organization with multiple branch offices and roaming users might
implement a Cisco VPN solution instead of point-to-point WAN links? (Choose three.)
What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/
A network administrator wants to ensure that only the server can connect to port Fa0/1 on a
Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is
about to bring the server online. What can the administrator do to ensure that only the MAC
address of the server is allowed by switch port Fa0/1? (Choose two.)