Unlike standard ACLs, the extended IP ACL requires the keyword ________ before an IP address to configure matching

A) host
B) ip
C) port
D) ipv4


A
Explanation: A) Extended IP ACLs require the use of the host keyword to identify an IP address for use in matching.

Computer Science & Information Technology

You might also like to view...

Javadoc comments are block comments containing special ____.

A. tags B. codes C. characters D. pointers

Computer Science & Information Technology

Establishing a method to erase or clear memory is an example of securing which of the following?

A. Data in transit B. Data at rest C. Data in use D. Data in motion

Computer Science & Information Technology

Which of the following physical security controls prevents an attacker from gaining access to a network closet?

A. CCTVs B. Proximity readers C. Motion sensors D. IP cameras

Computer Science & Information Technology

The FHS tree can stretch over several partitions, but they must all be located on the same computer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology