IP access lists can also be used to filter routing updates, to match packets for prioritization, to match packets for prioritization, to match packets for VPN tunneling, and to match packets for implementing quality of service features. It is also used to specify the interesting traffic, which is used to trigger ISDN and Dial on Demand Routing (DDR) calls.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Cisco Press, ISBN 1-58720-083-X) Page 427
Incorrect Answers:
A, F: ACLs do not provide for management and traffic analysis functions such as the monitoring and organization of network packets.
B. While ACLs can be used to filter out some unwanted traffic; they can not be used to routinely provide for virus detection and removal.
E. ACLs alone do not provide for any additional level of network availability.
QUESTION NO: 5
Router TK1 is configured using a named ACL. Which of the following answer choices are correct characteristics of named access list? (Select all that apply)
A.You can delete individual statements in a named access list
B.Named access lists require a numbered range from 1000 to 1099.
C.Named access lists must be specified as standard or extended.
D.You can use the ip access-list command to create named access lists.
E.You cannot delete individual statements in a named access list.
F.You can use the ip name-group command to apply named access lists.
Answer: A, C, D Explanation:
Named access lists have two advantages over numbered access lists: the first one being that a name is easier to remember and the second being the fact that you can delete individual statements in a named access list. That makes A correct.
When you create a named access list you use the ip access-list command, and you have to specify whether it's standard or extended (since there are no numbers). So C and D are both correct. An example from the textbook is the command, "ip access-list extended Barney"
Incorrect Answers:
B. Named access lists don't require a number range from 1000 to 1099 so B is incorrect.
E.Answer choice E is not true.
F.This is incorrect because the command ip name-group is absolutely unnecessary.
Leading the way in IT testing and certification tools, www.testking.com