If you configure an access-list to block the following networks, what are you trying to protect against? Network 127.0.0.0/8, Network 0.0.0.0\0, Network 10.0.0.0\8, Network 172.16.0.0\16, and Network 168.0.0\16. A. You are trying to protect against hijacking B. You are trying to protect against spoofing C. You are trying to protect against sniffing D. You are trying to protect against splicing E. You are trying to protect against capturing Answer: B QUESTION: 229 You are a host in a network segment that has IP addresses in the range of 168.16.1~192.168.31.254. You need to create an access control list that will filter your segment of addresses. Which of the following is the wildcard mask that will be used to filter your network segment? A. 10.0.16.1/20 B. 0.0.16.254 C. 255.240.0.0 D. 0.0.240.0 E. 0.0.15.255 Answer: E QUESTION: 230 The exhibit represents a simple routed network. Node 7 is a Windows NT 4.0 Workstation that establishes a TCP communication with Node 10, a Windows 2000 Professional host. The routers are Cisco 2500 series running IOS 11.2. While working at Node 10, you run a packet capture. When Node 10 receives a packet sent by Node 7, what will the capture reveal is the source MAC address? 96
A. Interface for Node 7 B. Interface E0 of Router A C. Interfaces for both Nodes 7 and E0 D. Interface E0 of Router D E. Interface for Node 10 Answer: D QUESTION: 231 During a network capture, using Wireshark, you capture some ICMP traffic for analysis. In an ICMP Message, what is the function of the first eight bits? A. To define the source port number B. To define the type C. To define the destination port number D. To define the IP Version E. To define the upper layer protocol Answer: B QUESTION: 232 A router has two active Ethernet interfaces. Interface E0 is connected to network 10.10.0.0/16
You've reached the end of your free preview.
Want to read all 7 pages?
- Fall '20
- IP address, Internet Protocol Suite