Which of the following is not a type of access list?

a. Standard
b. Protocol
c. Extended
d. Named


b. protocol
Explanation: Access lists use protocols in the extended and named ACLs. A standard ACL uses only IP address.

Computer Science & Information Technology

You might also like to view...

The Find Unmatched Query Wizard requires that the two tables being compared have a common field.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Match each item with a statement below.

A. a set of utilities and resources from Microsoft to help organizations run legacy software on Windows 10 B. a file-based image format developed by Microsoft to store multiple images in a single file C. a utility that is used to create answer files for Windows 10 unattended installations D. an installation that migrates all of the settings from a preexisting Windows operating system to Windows 10 E. a set of scriptable command-line utilities that are used to migrate user settings and files from a source computer to a destination computer F. a file used by Windows SIM to read the configurable settings and their current status for a WIM image G. a new configuration process for Windows 10 that modifies the configuration of an already installed Windows 10 operating system to match corporate standards H. an XML file used during an unattended setup to provide configuration to Setup.exe I. a tool that is used to generalize Windows 10 and prepare computers for imaging

Computer Science & Information Technology

What peripheral port type is expandable using a hub, operates at 1.5 MBps, and is used to connect various devices (from printers to cameras) to PCs?

A) DVD 1.0 B) USB 1.1 C) IEEE 1394 D) IEEE 1284

Computer Science & Information Technology

Distinguish between cold miss, capacity miss, and conflict miss.

What will be an ideal response?

Computer Science & Information Technology