1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BARSIC [14]
3 years ago
12

To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.

Computers and Technology
2 answers:
alexdok [17]3 years ago
7 0

Answer:

To deny a host from sending HTTP traffic destined to a specific server you will need to apply a <u>standard</u> access control list.

Further Explanation:

The access control list is mainly of two types: standard access control list and extended access control list.

Standard access control list is simplest one and used in filtering on source IP address. Therefore, standard access control list is used to grant or deny traffic from a specific source or specific host IP address.

On the other hand extended access control list is used to filter source or destination IP address, different protocols like TCP, UDP and different port numbers like ftp 21, telnet 23 etc.

Learn more:  

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

  • Grade: Computer Engineering
  • Subject: Computer Networks
  • Chapter: Data Link Control

Keyword:  

Access control list, htttp, https, host, source, client server, traffic, specific, standard access control list, extended access control list, IP address, host IP, filter, TCP protocol, UDP protocol, port numbers

DedPeter [7]3 years ago
6 0

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


You might be interested in
A device that makes it possible for multiple customers to share one address is called a/n _____.
Debora [2.8K]
When you use the word "address", I assume you are referring to an external address, in which case the answer is NAT (network address translation). Essentially, network address translation converts LAN IP addresses (local IP addresses) to WAN  IP addresses (external IP addresses). So for instance: everyone in my home accesses the internet under our network's external IP address. Inside our network, we have local IP addresses, which allow for packets to be routed to our individual machines wirelessly. So let's say my IP address on the LAN is 192.168.1.4, and I want to access brianly.com. My router performs NAT by converting my local IP to an external one which can be used for accessing the web. Then when data comes back to the network from brainly's server, my router once again performs NAT to convert between my external IP to my local IP, so that my router knows where the data needs to be routed to on the LAN.
6 0
3 years ago
Which represents the hierarchical structure of a Google Analytics account from top to bottom?
zlopas [31]

Answer: (D) Account > Property > View

Explanation:

 The Account > Property > View is the hierarchical structure of the google analytics account and it this hierarchical stricture basically represent from top to the bottom. The google account basically contain two and more properties for structuring the efficient accounts.

The property of the reporting view contain unique ID and it is the combination of digits and account ID. The view property in the analytic account basically used for access, analyzing and customize the data for viewing in proper way.

8 0
2 years ago
The amount of interest you will earn in one year from a savings account is the _____. A) APY B) return C) IDA D) CD
pav-90 [236]
B) return,<span>D) CD  i now is the </span>
7 0
3 years ago
Read 2 more answers
When you are almost done with your soup and want to get at the last little bit, how should you do this 2
pav-90 [236]

Answer:

<u>B. Tip the bowl slightly, then spoon up the last bit</u>

Explanation:

Generally speaking none of the other answers made much of sense.. "tip the bowl from side to side" doesn't help you at all, neither does "Keep spooning as much as you can, then stop eating". Neither of these will help you spoon up the last little bit, <u>the most logical answer is B. "Tip the bowl slightly, then spoon up the last bit"</u>. If this is not the correct answer then it'd be D, but I don't believe/feel that it's "poor etiquette" to "leave the last little bit".

7 0
2 years ago
What is the range of the well-known ports used by tcp and udp?
melamori03 [73]
/etc/services on my CentOS machine goes up to 49000. Reserved ports are less than 1024.

Well known and reserved ports are two different things. Well known ports only need a registration with IANA. Reserved ports, on *nixes, requires root for a deamon to bind to the port.
8 0
3 years ago
Other questions:
  • Can a Web developer guarantee that data presented is valid? Why or why not?
    9·1 answer
  • How do open online courses help with independent learning? (1 point)
    13·2 answers
  • Describe mobile computing
    7·1 answer
  • Amazon Web Services (AWS): Group of answer choices a) forms a majority percentage of Amazon's overall revenue. b) was introduced
    15·1 answer
  • Hiiiiiiiiiii hiiiiiiiiiiiiiiiiiii
    9·2 answers
  • What is it called when you remove some information from a file or remove a file from the disk ? A) save b) delete c) edit d) rem
    5·1 answer
  • The term Linux Intrusion Detection System ( LIDS) refers to a command that allows an administrator to run processes as root with
    5·1 answer
  • Margie has found a stock template to use. She changes a few things about the formatting and then saves the
    7·2 answers
  • The LCD screens are found in​
    14·1 answer
  • What is the internet​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!