Which of the following packets will be permitted in an extended IP ACL using the access-list statement access-list 101 permit ip host 1.1.1.1 ne 80 host 2.2.2.2 ne 80?

A) Any packet from host 1.1.1.1 with a source port other than 80 will be allowed to host 2.2.2.2 as long as the destination port is not 80.
B) Any packet from host 1.1.1.1 with a source port of 80 will be allowed to host 2.2.2.2 as long as the destination port is 80.
C) Any packet from host 2.2.2.2 with a source port other than 80 will be allowed to host 1.1.1.1 as long as the destination port is not 80.
D) Any packet from host 2.2.2.2 with a source port of 80 will be allowed to host 1.1.1.1 as long as the destination port is 80.


A
Explanation: A) This statement disallows all traffic on port 80 between these two hosts. Only traffic from host 1.1.1.1 to host 2.2.2.2 without using port 80 for the source or destination is allowed by this statement.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. The concepts of icons, menus and windows were originally developed by Xerox PARC. b. Windows is an open source operating system. c. The software that contains the core components of the operating system is called the kernel. d. Linux source code is available to the public for examination and modification.

Computer Science & Information Technology

Which subfolder in your Personal Folder is the default location used by Internet Explorer for files you get from the Web?

A) Documents B) Downloads C) Music D) Picture

Computer Science & Information Technology

Check boxes and ____________________ are helpful when you want the visitor to be able to choose multiple options.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In Windows Server 2012 R2, DNS is present as a server ________

Fill in the blank(s) with correct word

Computer Science & Information Technology