456
Chapter 11
Access Policies
Written Lab
1.
Port security is typically an access policy at which layer?
2.
Access lists are typically used for an access policy at which layer?
3.
What command applies an access list to a routing table?
4.
What command applies an access list to a VTY line?
5.
What command applies an access list to an HTTP server running on a
router?
6.
What is the standard IP access list number range?
7.
Where would you place extended access lists in the network?
8.
How do you set port security on a set-based switch?
9.
If you wanted to set usernames and passwords for the console port,
which command must you set under the line console 0 command?
10.
What are the four types of banners you can set on a Cisco router?
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com