exam questions

Exam 210-260 All Questions

View all questions & answers for the 210-260 exam

Exam 210-260 topic 1 question 120 discussion

Actual exam question from Cisco's 210-260
Question #: 120
Topic #: 1
[All 210-260 Questions]

Which of the following statements about access lists are true? (Choose three.)

  • A. Extended access lists should be placed as near as possible to the destination
  • B. Extended access lists should be placed as near as possible to the source
  • C. Standard access lists should be placed as near as possible to the destination
  • D. Standard access lists should be placed as near as possible to the source
  • E. Standard access lists filter on the source address
  • F. Standard access lists filter on the destination address
Show Suggested Answer Hide Answer
Suggested Answer: BCE 🗳️
Standard ACLs -
A standard IP ACL is simple; it filters based on source address only. You can filter a source network or a source host, but you cannot filter based on the destination of a packet, the particular protocol being used such as the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), or on the port number. You can permit or deny only source traffic.
Extended ACLs:
An extended ACL gives you much more power than just a standard ACL. Extended IP ACLs check both the source and destination packet addresses. They can also check for specific protocols, port numbers, and other parameters, which allow administrators more flexibility and control.

Named ACLs -
One of the disadvantages of using IP standard and IP extended ACLs is that you reference them by number, which is not too descriptive of its use. With a named
ACL, this is not the case because you can name your ACL with a descriptive name. The ACL named DenyMike is a lot more meaningful than an ACL simply numbered 1. There are both IP standard and IP extended named ACLs.
Another advantage to named ACLs is that they allow you to remove individual lines out of an ACL. With numbered ACLs, you cannot delete individual statements.
Instead, you will need to delete your existing access list and re-create the entire list.
Reference:
http://computernetworkingnotes.com/network-security-access-lists-standards-and-extended/access-control-list.html

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Currently there are no comments in this discussion, be the first to comment!
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago