Which IPv6 ACL statement would be used to deny all SSH traffic coming from the 2001:db8:2525:6342::/64 network to the 2001:db8:3672:2643::/64 network?

A) drop tcp 2001:db8:2525:6342::/64 2001:db8:3672:2643::/64 eq ssh
B) deny tcp 2001:db8:2525:6342::/64 2001:db8:3672:2643::/64 eq ssh
C) drop tcp 2001:db8:2525:6342::/64 2001:db8:3672:2643::/64 eq 22
D) deny tcp 2001:db8:2525:6342::/64 2001:db8:3672:2643::/64 eq 22


D
Explanation: D) The permit {ipv6 | tcp | udp} {source-ipv6-prefix/prefix-length | any | host source-ipv6-address} [operator port-number] {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address} [operator port-number] command is used when configuring extended IPv6 ACLs. To deny all SSH traffic from the 2001:db8:2525:6342::/64 network to the 2001:db8:3672:2643::/64 network, the deny tcp 2001:db8:2525:6342::/64 2001:db8:3672:2643::/64 eq 22 statement would be used.

Computer Science & Information Technology

You might also like to view...

In the mail merge process, the ________ source contains the information that will change, such as names and addresses, with each letter or label

Fill in the blank(s) with correct word

Computer Science & Information Technology

____ protocols, such as TCP, require an acknowledgment (ACK) of the receipt of data packets.

A. Connectionless B. SYN C. Application-layer D. Connection-oriented

Computer Science & Information Technology

To organize entries in the Navigation Pane by table, click ____ on the Navigation Pane menu.

A. Objects by Table B. Table Object C. Tables and Related Views D. Default

Computer Science & Information Technology

The cable ends in a bus topology network must be terminated to prevent a signal sent from one computer from ____________________ at the ends of the cable, quickly bringing the network down.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology