Computer Networks Questions & Answers – ACL

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “ACL”.

1. Which of the following can be suited as a definition of an Access List?
a) Set of protocols to define traffic in a router
b) Set of rules used for packet filtering
c) Set of guidelines that every router should follow
d) Set of features that every router contains
View Answer

Answer: b
Explanation: An access control list is a set of confinements(rules), which can be configured in a router. These rules are defined to permit specific packets and to refuse particular packets at interface. ACL acts as a firewall at the router, which performs packet filtering.

2. Which of the following set is used to identify Access Lists?
a) Number and name
b) Number and special characters
c) Names and binary numbers
d) Special character and binary numbers
View Answer

Answer: a
Explanation: We can assign names that suits our list so that we can remember them easily. Also, these named access lists are convenient to edit. Numbered access lists have specific number range to use and entries in these lists can’t be deleted.

3. Which of the following aspects can’t be managed by a standard access list?
a) Allowing a Network
b) Denying a sub-network
c) Denying a service
d) Allowing a host
View Answer

Answer: c
Explanation: Standard access list can’t deny or allow a particular service from the host. It can deal with a host or network or sub-network only. An extended access list can contain restrictions for the services that belong to different port numbers in a host.
advertisement
advertisement

4. Which set of things will be taken into account in order to filter the packets in an extended access list?
a) Source IP address and destination IP address
b) Source IP address, protocol and port number
c) Source IP address
d) Source IP address, protocol, port number and destination IP address
View Answer

Answer: d
Explanation: In standard access list, only a destination IP address is used to filter, but in extended access list, source and destination IP address, protocol and port number are used. More specifications in packet filtering make extended access lists more sophisticated and advanced in security.

5. One interface of a router can have multiple access lists.
a) True
b) False
View Answer

Answer: b
Explanation: Each interface and protocol are allowed to have only one access list; also, multiple access lists for an interface causes ambiguity. But layer 2 devices can have multiple access lists for a single interface based on defined norms.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. What will happen if an empty access list is assigned to an interface?
a) It will allow all the packets into the network
b) It will deny all the packets from entering the network
c) It will allow only few packets into the network
d) It does nothing
View Answer

Answer: a
Explanation: If there is no access list with the name that is assigned to the interface, then it can be considered as an empty access list. Empty access list clearly indicates that there are no restrictions on the packets. So, the interface will send all the packets into the network without restriction.

7. What is the range of standard access list, if it is numbered?
a) 1 to 99
b) 99 to 199
c) 1 to 99 or 1300 to 1999
d) 99 to 199 or 2000 to 3000
View Answer

Answer: c
Explanation: Both ranges help to identify whether specific access list is standard or extended. Standard access lists can also be represented by names, but unlike named lists, numbered access lists do not support modification like edit, or delete in them.
advertisement

8. What is the range of numbered extended access list?
a) 1 to 99 or 1300 to 1999
b) 1 to 99 or 1300 to 2699
c) 100 to 199 or 1999 to 2699
d) 100 to 199 or 2000 to 2699
View Answer

Answer: d
Explanation: Given ranges will differ from numbered standard access list which has range from 1 to 99 or 1300 to 1999. Given ranges are used to distinguish the standard list and extended list.

9. Which of the following cannot be an advantage of an access list?
a) It furnishes the security
b) It helps the network to perform well
c) It speeds up the packet transmission
d) It manages the traffic over the network
View Answer

Answer: c
Explanation: An access list cannot speed up the packet transmission. An access list is nothing but a set of rules, which needs to be checked for a packet at the interface. So, the packet may take more time to be transmitted than usual time when it is subjected to checking.
advertisement

10. What is the main advantage of Port Access Control List?
a) It is implemented on layer 3 devices
b) It supports outbound and inbound traffic
c) It can have 2 access lists on a layer 2 interface
d) It can be configured on Ether-Channel also
View Answer

Answer: c
Explanation: Port access control list can be configured on layer 2 devices. As layer 2 deals with MAC and IP addresses, port access list supports both MAC access list and IP access list. So, a single interface can have 2 access lists in layer 2. Ether-Channels cannot configure port access control lists.

Sanfoundry Global Education & Learning Series – Computer Networks.

To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.