What are some of the advantages of using named access lists?

What will be an ideal response?


The naming feature allows you to maintain security by using an easily identifiable access list. It also removes the limit of 100 lists per filter type. In addition, with named access lists lines can be selectively deleted in the ACL. This feature does not allow you to add lines to the ACL; any lines added to a named ACL are applied to the end of the list. Named ACLs provide greater flexibility to network administrators who work in environments where large numbers of ACLs are needed, such as a large ISP.

Computer Science & Information Technology

You might also like to view...

What process area helps to ensure that risk management is properly performed?

A. PA12 Manage Project Risks B. PA13 Manage Configurations C. PA14 Manage Project Risks D. PA15 Monitor and Control Technical Effort

Computer Science & Information Technology

Given the following character array

char[] h = {‘H’, ‘E’, ‘L’, ‘L’, ‘O’}; Write a Java statement that will create a new String object from the character array.

Computer Science & Information Technology

In the accompanying figure, Item 3 indicates that red has been selected as a theme color on the ____.

A. Color Dialog box B. Color Palette C. Text Effects gallery D. Format Painter

Computer Science & Information Technology

Which of the following is the best practice to follow when creating new user accounts?

a. Give users the maximum amount of privileges and permissions so they can do their job. b. Give users the least amount of permissions and privileges they need to do their job. c. Make users members of the administrator group so that they can do their job. d. Give users the default permissions and privileges.

Computer Science & Information Technology