exam questions

Exam 350-401 All Questions

View all questions & answers for the 350-401 exam

Exam 350-401 topic 1 question 575 discussion

Actual exam question from Cisco's 350-401
Question #: 575
Topic #: 1
[All 350-401 Questions]


Refer to the exhibit. Which two commands are required on router R1 to block FTP and allow all other traffic from the Branch 2 network? (Choose two.)

  • A. access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp-data access-list 101 permit ip any any
  • B. access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp-data access-list 101 permit ip any any
  • C. interface GigabitEthernet0/0 ip address 10.0.0.1 255.255.255.252 ip access-group 101 out
  • D. access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp access-list 101 permit ip any any
  • E. interface GigabitEthernet0/0 ip address 10.0.101.1 255.255.255.252 ip access-group 101 in
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
dragonwise
Highly Voted 2 years, 2 months ago
A. access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp-data access-list 101 permit ip any any B. access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp-data access-list 101 permit ip any any C. interface GigabitEthernet0/0 ip address 10.0.0.1 255.255.255.252 ip access-group 101 out D. access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp access-list 101 permit ip any any E. interface GigabitEthernet0/0 ip address 10.0.101.1 255.255.255.252 ip access-group 101 in
upvoted 19 times
...
HungarianDish_111
Highly Voted 2 years, 5 months ago
Selected Answer: AC
I suspect errors in the provided options. I would expect to see options like these based on the topology: C. interface GigabitEthernet0/0 ip address 10.0.101.1 255.255.255.0 ip access-group 101 out <<< applied for traffic leaving R1 on LAN facing interface E. interface interface Serial 0/0/0 ip address 10.0.0.1 255.255.255.0 ip access-group 101 in <<< applied for traffic coming to R1 on WAN facing interface
upvoted 11 times
KZM
1 year, 3 months ago
Deny in return traffic from FTP Server with IP access-group 101 in (G0/0)
upvoted 1 times
Paladin17
4 months, 1 week ago
in that case acl to>from IPs changes?
upvoted 1 times
...
...
...
tltechcert
Most Recent 1 month ago
Selected Answer: AC
I think the big confusion here is on which router are we configuring the ACLs. A and C might make sense if we are configuring this on R2. A and E makes sense if we are configuring this on R1. The question is not clear which Router we are configuring this on.
upvoted 1 times
...
Doopfenel
3 months ago
Selected Answer: AC
E is wrong interface GigabitEthernet0/0 ip address 10.0.101.1 255.255.255.252 ip access-group 101 in interface GigabitEthernet0/0: This refers to the interface on R1 connected to the WAN (10.0.0.0/24). ip access-group 101 in: This applies access list 101 to incoming traffic on the GigabitEthernet0/0 interface. This would block traffic coming from the WAN to R1, which is not what we want. We need to block traffic going out of R1 towards the FTP server.
upvoted 1 times
tltechcert
1 month ago
Are you crazy? that's exactly what we want. The question says "Block FTP traffic to R1", for instance, if you had a Firewall and wanted to allow FTP traffic to a server on your inside Zone, you absolutely allow it INTO your network "permit Outside / Inside FTP". In this instance, our Router is wide-open, so we deny FTP traffic on the R1 WAN facing interface (e0/0) and allow everything else. Abso-Fing-lutely.
upvoted 1 times
...
...
matass_md
4 months ago
Selected Answer: AE
It's E because even tough it's says g0/0 and we don't see what interface is that , ACL placement and logic dictates if you are going to drop traffic DO IT BEFORE the ROUTER PROCESS IT . Why use resources if you are going to drop traffic? So int g0/0 ip access-group 101 in (trafic entering the router from WAN direction )
upvoted 1 times
...
a57ab39
6 months, 3 weeks ago
Selected Answer: AE
It surely be AE
upvoted 2 times
...
AbdullahMohammad251
9 months ago
Selected Answer: AE
Options B, C, and D are incorrect. FTP uses 2 ports, port 20, and port 21, and to block ftp we need to block both ports. Options B and D can't be used together. If option B is installed first, it will work fine. But when option D is configured, the ACL entry "access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp" will be overridden by the previous entry "permit ip any any" entry from option B. Option C is incorrect, we're using GigabitEthernet interfaces for LAN, and serial interfaces for WAN to connect the routers.
upvoted 4 times
AbdullahMohammad251
9 months ago
Option A is correct, we need to use this configuration to deny all TCP ports (port 20 & 21, or eq ftp-data & FTP." Option E is correct, but it should be"out" not "in," I think there's a typo in the answers. - FTP traffic will travel as ingress traffic at the WAN interface interface and as egress traffic at the LAN interface towards the FTP server. The correct configuration: interface GigabitEthernet0/0 ip address 10.0.101.1 255.255.255.252 ip access-group 101 out
upvoted 2 times
...
...
[Removed]
1 year ago
Selected Answer: AC
A & C are correct, even if the it should be made differently
upvoted 1 times
...
[Removed]
1 year, 1 month ago
A & C are correct, even if the it should be made differently
upvoted 2 times
...
Shri_Fcb10
1 year, 1 month ago
Selected Answer: AE
access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp-data access-list 101 permit ip any any Assuming GigabitEthernet0/0 is the interface connected to the WAN. interface GigabitEthernet0/0 ip address 10.0.0.1 255.255.255.252 ip access-group 101 in
upvoted 6 times
...
IgorLVG
1 year, 3 months ago
the answer need to include A option (https://www.cisco.com/c/es_mx/support/docs/ip/access-lists/26448-ACLsamples.html) access-list 102 deny tcp any any eq ftp access-list 102 deny tcp any any eq ftp-data access-list 102 permit ip any any (as example)
upvoted 1 times
...
Haidary
1 year, 4 months ago
DE In D we define our access list and in E we apply our access list on router g0/0 inside interface.
upvoted 1 times
...
sledgey121
1 year, 6 months ago
AC It can't be any other answers.
upvoted 2 times
...
sergiosolotrabajo
1 year, 7 months ago
Guys just pass this question go to the next one. Most suitable answers are B and D. C and E are wrong, bad mask and bad in/out configuration, so we cannot even select answer A. We have to think as the ACL was already apply, and then B and D.
upvoted 1 times
...
djedeen
1 year, 10 months ago
Selected Answer: AC
A) need to block both FTP ports, and Gig intf must be towards the switch (not a WAN intf) so the direction is out.
upvoted 2 times
...
JochenStacker
1 year, 10 months ago
Selected Answer: AC
I'm voting first for A because it denies both FTP ports and is the only sane answer. My second vote goes for option C. Interface Gig 0/0 MUST be the interface facing SW1. Because the other interface has to be a serial interface as per the squiggly line and the cloud marked "WAN". This option applies access list 101 in an outward direction from R1 towards SW1 and therefore makes sense.
upvoted 3 times
...
alex711
1 year, 10 months ago
Selected Answer: DE
Voting for DE https://community.cisco.com/t5/other-network-architecture-subjects/acl-to-block-ftp-servers/td-p/72508
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...