Which of the following is one of the steps to apply access lists on a router?
a. Isolate the servers.
b. Identify the problem.
c. Decide where to place the access list.
d. Both a and b.
e. Both b and c.
e. Both b and c
Explanation: The first two steps to apply access lists on a router are to identify the problem and to decide where to place the access list. Servers are isolated when created a demilitarized zone.
You might also like to view...
The ____________________ protocol is based on the circulation of a token in a logical ring and seizing the frame from the ring for the purpose of data frame transmission.
Fill in the blank(s) with the appropriate word(s).
A UPS is similar to a battery backup
Indicate whether the statement is true or false
The ______________ protocol is used for fast, nonconnection-oriented communications with no guarantee of delivery—typically small short bursts of data
Fill in the blank(s) with correct word
What would display if the following pseudocode was coded and executed?
```
Declare String user = "Joey"
If isInteger(user) Then
Set intUser = stringToInteger(user)
Display intUser
Else
Display "Not a valid number"
```
a. "Joey"
b. Joey
c. Not a valid number
d. Joey Not a valid number