Question 6 of 348
Which of the following parameters is not used by Advanced ACL?
    Correct Answer: A

    Advanced ACLs (Access Control Lists) typically do not use the 'Source interface' as a parameter. Instead, they commonly include criteria such as the destination port number, protocol number, and time-range to create more precise and detailed traffic filtering rules. The 'Source interface' is not a parameter that is configurable within Advanced ACLs.

Question 7 of 348
Exam H12-211: Question 7 - Image 1
Refer to the configuration output. Which of the following statements regarding ACL 2001 is correct?
    Correct Answer: A

    The correct answer is that packets from network 10.0.1.0/24 will be denied. The configuration output shows that there are two rules in ACL 2001. The first rule permits traffic from the network 10.0.1.0/24, but the second rule explicitly denies traffic from the same network. In an ACL, the rules are processed in order from top to bottom. Since the second rule denies the traffic, it takes precedence over the first rule allowing it. Therefore, packets from the network 10.0.1.0/24 will ultimately be denied.

Question 8 of 348
Following a failure of services in the network, an administrator discovered that the configuration in one of the enterprise routers had been changed.
What actions can be taken by the administrator to prevent further changes? (Choose three)
    Correct Answer: B, C, D

    To prevent unauthorized changes to the router's configuration, the administrator should ensure that user management and access control measures are in place. Configuring AAA (Authentication, Authorization, and Accounting) helps manage user access and permissions effectively. An Access Control List (ACL) can be set up to allow only the administrator to access the router, significantly reducing the risk of unauthorized changes. Port-security configuration is also critical as it can restrict access to the router based on the MAC addresses of devices, thereby adding an additional layer of security. However, setting the login privilege of users to 0 (Option A) is not practical as it would typically deny all capabilities to the users, including valid administrative actions.

Question 9 of 348
Exam H12-211: Question 9 - Image 1
Refer to the configuration output. Which of the following statements is correct regarding the configuration of the ACL on RTA?
    Correct Answer: A

    The ACL rules are evaluated in order of their sequence numbers. Rule 10 denies packets from the source network 20.1.1.0/24, and since it is listed before rule 20, which permits the same network, packets from network 20.1.1.0/24 will be denied as soon as rule 10 is matched. Therefore, the correct statement is that packets from network 20.1.1.0/24 network will be denied.

Question 10 of 348
Exam H12-211: Question 10 - Image 1
Refer to the configuration output. Which of the following statements are correct regarding the configuration of the ACL on RTA? (Choose two).
    Correct Answer: A, B

    Packets from network 172.16.1.1/32 will be denied because the rule explicitly denies the source address 172.16.1.1 with a wildcard mask of 0.0.0.0, which matches only that single IP address. Packets from network 172.16.1.0/24 will be denied because the rule also denies any source address in the 172.16.0.0/16 network with a wildcard mask of 0.255.0.0, which includes the entire 172.16.1.0/24 subnet.