Match each item with a statement below:

A. built into the Cisco IOS; solve many problems associated with traffic flow and security
B. one of the most common problems associated with access lists
C. removes an access list
D. determines which bits of the source address are significant
E. the mixing of 0s and 1s in a wildcard mask octet
F. permit or deny packets based only on the source address
G. filter by source IP address, destination IP address, protocol type, and application port number
H. use names instead of numbers to identify themselves
I. the default for standard IP access lists


A. Access lists
B. Lack of planning
C. no access-list [list #]
D. Wildcard mask
E. Partial masking
F. Standard IP access lists
G. Extended IP access lists
H. Named access lists
I. Single host wildcard mask

Computer Science & Information Technology

You might also like to view...

The ________ function rounds a number down toward zero to the number of digits indicated

Fill in the blank(s) with correct word

Computer Science & Information Technology

Windows 2003 Server extends the capabilities of Windows 2000 Server.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A loop for which the number of iterations is predetermined is known as what type of loop?

A. indefinite B. infinite C. counted D. definite

Computer Science & Information Technology

RFID tags need to be within line of sight of a reader.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology