Unlike standard ACLs, the extended IP ACL requires the keyword ________ before an IP address to configure matching
A) host
B) ip
C) port
D) ipv4
A
Explanation: A) Extended IP ACLs require the use of the host keyword to identify an IP address for use in matching.
You might also like to view...
Javadoc comments are block comments containing special ____.
A. tags B. codes C. characters D. pointers
Establishing a method to erase or clear memory is an example of securing which of the following?
A. Data in transit B. Data at rest C. Data in use D. Data in motion
Which of the following physical security controls prevents an attacker from gaining access to a network closet?
A. CCTVs B. Proximity readers C. Motion sensors D. IP cameras
The FHS tree can stretch over several partitions, but they must all be located on the same computer.
Answer the following statement true (T) or false (F)