exam questions

Exam 200-301 All Questions

View all questions & answers for the 200-301 exam

Exam 200-301 topic 1 question 624 discussion

Actual exam question from Cisco's 200-301
Question #: 624
Topic #: 1
[All 200-301 Questions]

Refer to the exhibit. Which configuration for RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other traffic?

A.

B.

C.

D.

Show Suggested Answer Hide Answer
Suggested Answer: B

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
nakres64
Highly Voted 3 years, 5 months ago
access-group [in|out] is used to tie an access-list to an interface. access-class [in|out] is used to tie an access-list to vty lines. So in case you want to prevent incoming network traffic on port 80 through Ethernet 0/0 you use int E0/0 ip access-group 123 in In case you want to allow only your PC from accessing the VTY via telnet/SSH use line vty 0 4 ip access-class 1 in
upvoted 24 times
...
iGlitch
Highly Voted 2 years, 2 months ago
A and B both are correct, BUT if you choose g0/0 interface then PC1 still be able to SSH using RTR-1 loopback interfaces, So you should implement that ACL on VTY lines to prevent SSH connections thro any interface.
upvoted 19 times
joeylam
1 year, 7 months ago
I guess the SSH connection to the loopback will be blocked at G0/0 of RTR1 before it reach the loopback address?
upvoted 6 times
...
...
Lse
Most Recent 1 week, 6 days ago
both A and B are correct, as the both block ssh. option B. applies ACL to the VTY lines using line vty 0 15, which controls SSH access to the router via VTY but does not block SSH from the interface where PC-1 is connected. ALso it does not address the inbound traffic from PC-1 on GigabitEthernet0/0. Option A is more specific with question, deny traffic at interface level. "RTR-1 denies SSH access from PC-1 to any RTR-1 interface" interface is the keyword. I will go with option A.
upvoted 1 times
...
[Removed]
3 months, 2 weeks ago
B is the most correct
upvoted 1 times
...
NewJeans
9 months, 2 weeks ago
Answer: A You can apply a standard ACL directly on VTY lines. But you can't apply an extended ACL on VTY lines. If you want to use extended ACLs to secure VTY lines, you have to use an ACL for each interface that a user can use to access the VTY lines. https://www.computernetworkingnotes.com/ccna-study-guide/how-to-secure-vty-access-to-the-router.html#:~:text=You%20can%20apply%20a%20standard,to%20access%20the%20VTY%20lines.
upvoted 2 times
[Removed]
7 months, 1 week ago
Good eye, but apparently this isn't true as of IOS 12.4 (All the way back 15 years ago!), so extended ACLs are actually accepted. https://blog.ipspace.net/2006/12/vty-access-class-accepts-extended-and.html
upvoted 1 times
...
...
Da_Costa
1 year ago
B is correct because port 22 is ssh
upvoted 2 times
...
liviuml
1 year, 3 months ago
Answer A. Both A and B have same result. Tested in PT. My answer is based on the fact that extended ACL should be applied closest to the source. If ACL is applied to vty the pachets will cross G0/0 to reach virtual terminal. Usually vty are secured with standard ACL, lines with extended ACL. The practice result of A and B are the same. I think is more abotu best practice. Regards, Read: https://www.computernetworkingnotes.com/ccna-study-guide/how-to-secure-vty-access-to-the-router.html
upvoted 2 times
dropspablo
1 year, 1 month ago
Perhaps the router would be vulnerable with an ACL on the interface, as another host could access the VTY lines from other interfaces (if it has one), without ACLs. I believe it would be better to place the ACLs directly on the VTY lines, to ensure security.
upvoted 3 times
...
...
cormorant
1 year, 7 months ago
the part that trips you up: denies SSH access from PC-1 to any RTR-1 interface. option a indicates a single interface, which goes against te statement "to any RTR-1 interface". therefore you should aim for live vty 0 15. thus you should rule out a
upvoted 2 times
...
Computerguy
2 years ago
answer is A
upvoted 1 times
...
Hodicek
2 years, 8 months ago
NO SORRY 1 FOR SSH AND OTHER FOR TELNET SO B IS CORRECT
upvoted 1 times
...
Hodicek
2 years, 8 months ago
B - D ARE THE SAME AM I CORRECT?
upvoted 1 times
shakyak
2 years, 7 months ago
No check the port number
upvoted 2 times
...
Belinda
2 years, 4 months ago
Hello! B and D are not the same. B is eq 22 which means SSH while D is eq 23 means TELNET. Port 22 is for SSH while port 23 is for TELNET. SSH data transmission is encrypted while TELNET data transmission is in plain where anyone can read it.
upvoted 5 times
...
...
dave1992
2 years, 9 months ago
A is correct because the question is asking for 1 host. not a whole network. we are denying traffic to the router. we dont need any complex config. its simply answer A.
upvoted 2 times
Cpynch
2 years, 5 months ago
A will block SSH traffic for anything on any other interface of the router as well I believe. It specifically asks to block SSH to RTR-1 interface, AKA the vyt lines.
upvoted 2 times
sgashashf
2 years, 4 months ago
Close. A will block PC1 from being able to SSH into anything on the other side of the router. Our goal is to ensure PC1 can't SSH into RTR-1, not to stop it from SSHing into any devices beyond.
upvoted 3 times
...
...
...
Ray12345
3 years, 2 months ago
whats the different between apply the ACL on the interface and on the vty line..
upvoted 2 times
Sten111
3 years ago
Question specifies any RTR1 interface
upvoted 2 times
...
...
ddino
3 years, 3 months ago
A is the answer unless you are planning to allow everyone else to ssh to your router
upvoted 2 times
Joe_Q
3 years, 3 months ago
If the ACL is applied to the G0/0 interface it completely denies SSH traffic to the network as a whole. In this case, you just what to deny SSH traffic to the router's VTY ports. Therefore, question A is not correct. I know poorly worded question. Some of these questions do not prove if you know the content, it just proves that you are able to pick out "Key" words in a timely manner.
upvoted 12 times
onmils2
2 years, 11 months ago
Answer A doesn't deny ssh for the whole network only for host 172.16.1.33, it's in the command that it only block this IP.
upvoted 5 times
[Removed]
2 years, 10 months ago
only from the host to any. ACL structure = access-list "number" deny/permit host "sourceip" (source port) "destination ip" "destination port" In this case source address is pc1, destination any, so ssh connection qill be blocked from pc1 to all the network
upvoted 1 times
Cpynch
2 years, 5 months ago
Correct. All SSH traffic stops at gi0/0 with A, even SSH packets that are headed to elsewhere on any other interface of the router. So, if another router was connect to another interface on RTR-1, and you wanted to SSH to that router, traffic would not flow past gi0/0 for anything, on any network from that specific host.
upvoted 1 times
...
...
...
...
...
Nhan
3 years, 4 months ago
For this question we are looking at denying ssh which is port 22, and because it is line very so it’s is using access class so given answer is correct
upvoted 4 times
...
xsp
3 years, 5 months ago
for interface, add ip access-group <access list number> in/out for vty, access-class <access list number> in/out
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago