Which of the following is one of the steps to apply access lists on a router?

a. Isolate the servers.
b. Identify the problem.
c. Decide where to place the access list.
d. Both a and b.
e. Both b and c.


e. Both b and c
Explanation: The first two steps to apply access lists on a router are to identify the problem and to decide where to place the access list. Servers are isolated when created a demilitarized zone.

Computer Science & Information Technology

You might also like to view...

The ____________________ protocol is based on the circulation of a token in a logical ring and seizing the frame from the ring for the purpose of data frame transmission.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A UPS is similar to a battery backup

Indicate whether the statement is true or false

Computer Science & Information Technology

The ______________ protocol is used for fast, nonconnection-oriented communications with no guarantee of delivery—typically small short bursts of data

Fill in the blank(s) with correct word

Computer Science & Information Technology

What would display if the following pseudocode was coded and executed?

```
Declare String user = "Joey"
If isInteger(user) Then
     Set intUser = stringToInteger(user)
     Display intUser
Else
     Display "Not a valid number"

```

a. "Joey"   
b. Joey   
c. Not a valid number
d. Joey Not a valid number

Computer Science & Information Technology