Refer to the figure. What would result from the configuration shown in the figure? (Choose all that apply.)

--------------------------------------------------------------
access-list 50 permit 192.168.16.0 0.0.15.255
access-list 50 permit 192.168.192.0 0.0.63.255
--------------------------------------------------------------

A) Traffic from 192.168.240.87 would be permitted.
B) Traffic to 192.168.16.1 would be permitted.
C) Traffic to 192.168.192.150 would be permitted.
D) Traffic from 192.168.25.101 would be permitted.


A) Traffic from 192.168.240.87 would be permitted.


D) Traffic from 192.168.25.101 would be permitted.

Explanation:
The following are the results of applying ACL 50:

First line: Traffic from the 192.168.16.0/20 network would be permitted.
Second line: Traffic from the 192.168.192.0/18 network would be permitted

Computer Science & Information Technology

You might also like to view...

You cannot boot a computer from ____________.

A. the hard drive B. a CD or DVD C. a USB flash drive D. a wireless network

Computer Science & Information Technology

Consider a graph signal f with its GFT ˆf = ? 0 ( ? `), that is, the signal is localized around zero frequency in the graph spectral domain. Prove that when the graph signal f is modulated to frequency ? k, the resulting graph signal is localized around frequency







Computer Science & Information Technology

Will mobile devices replace desktop system units and traditional laptop computers? How would networks have to change if that were to happen?

What will be an ideal response?

Computer Science & Information Technology

Names that you assign to cells and cell ranges can be used in formulas.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology