easymultiple choiceObjective-mapped

An ACL on R1 contains only these entries:

access-list 101 permit tcp 10.10.10.0 0.0.0.255 any eq 443
access-list 
101 permit icmp any any

What happens to an HTTP packet sourced from 10.10.10.25 and destined for 198.51.100.10 if ACL 101 is applied in the traffic path?

Question 1easymultiple choice
Full question →

An ACL on R1 contains only these entries:

access-list 101 permit tcp 10.10.10.0 0.0.0.255 any eq 443
access-list 
101 permit icmp any any

What happens to an HTTP packet sourced from 10.10.10.25 and destined for 198.51.100.10 if ACL 101 is applied in the traffic path?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

It is permitted because the source subnet is allowed.

The ACL is not permitting the source subnet broadly; it is permitting only TCP 443 from that subnet.

B

Best answer

It is denied by the implicit deny.

The packet does not match either permit entry, so the implicit deny drops it.

C

Distractor review

It is translated by NAT before the ACL is checked.

NAT behavior depends on placement and is not the point of this ACL question.

D

Distractor review

It is converted to HTTPS automatically.

Routers do not rewrite application protocols in that way.

Common exam trap

Common exam trap: answer the scenario, not the keyword

A common exam trap is assuming that permitting a source subnet in an ACL automatically allows all traffic from that subnet regardless of protocol or port. In this question, the ACL permits TCP traffic only on port 443 from the 10.10.10.0/24 subnet, so HTTP traffic on port 80 is not permitted and is dropped by the implicit deny. Another trap is ignoring the implicit deny rule at the end of ACLs, which silently blocks unmatched traffic. Candidates might incorrectly believe that the ICMP permit entry or the subnet permit implies broader access, but ACLs require explicit matches for each protocol and port combination.

Technical deep dive

How to think about this question

Access Control Lists (ACLs) are fundamental security tools in Cisco networking that filter traffic based on defined criteria such as source and destination IP addresses, protocols, and port numbers. ACLs are processed sequentially, and once a packet matches an entry, the corresponding permit or deny action is applied immediately. If no entries match, an implicit deny at the end of the ACL drops the packet by default. This behavior ensures that only explicitly permitted traffic passes through, enhancing network security and traffic control. In this scenario, ACL 101 permits TCP traffic sourced from the 10.10.10.0/24 subnet only if it is destined for any address on port 443 (HTTPS). It also permits all ICMP traffic regardless of source or destination. Since HTTP traffic uses TCP port 80, a packet from 10.10.10.25 to 198.51.100.10 on port 80 does not match any permit statement. Consequently, the ACL's implicit deny rule blocks this HTTP packet. This demonstrates the importance of specifying correct protocols and ports in ACLs to avoid unintended traffic drops. A common exam trap is assuming that permitting a subnet in an ACL automatically allows all traffic from that subnet. However, ACLs are explicit and require exact matches on protocol and port numbers. Another trap is misunderstanding the implicit deny rule, which silently drops unmatched packets without logging by default. Practically, this means network administrators must carefully design ACLs to include all necessary permit statements and understand that any traffic not explicitly permitted will be denied, ensuring predictable and secure network behavior.

KKey Concepts to Remember

  • ACLs process packets sequentially and apply the first matching permit or deny rule encountered in the list.
  • An implicit deny at the end of every ACL blocks any traffic that does not match a permit entry.
  • ACL entries must explicitly specify protocol types and port numbers to permit corresponding traffic.
  • Permitting a source subnet in an ACL does not automatically permit all protocols or ports from that subnet.
  • TCP port 80 is used for HTTP traffic, while TCP port 443 is used for HTTPS traffic in ACL filtering.
  • ICMP traffic is permitted by a separate ACL entry and does not affect TCP traffic filtering.
  • Cisco routers do not modify application layer protocols such as converting HTTP to HTTPS automatically.
  • Understanding implicit deny behavior is critical to designing effective ACLs that do not unintentionally block traffic.

TExam Day Tips

  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related 200-301 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this 200-301 question test?

ACLs process packets sequentially and apply the first matching permit or deny rule encountered in the list.

What is the correct answer to this question?

The correct answer is: It is denied by the implicit deny. — HTTP uses TCP port 80, not 443. Because the ACL does not include a permit for that traffic, it is dropped by the implicit deny at the end of the ACL. The ICMP entry is irrelevant because the packet is TCP.

What should I do if I get this 200-301 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.