1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
4 years ago
11

The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host 10.0.0.3. Al

so he needs to permit all FTP traffic to the rest of the network and deny all other traffic. After he applied his ACL configuration in the router nobody can access to the ftp and the permitted hosts cannot access to the Internet. According to the next configuration what is happening in the network? access-list 102 deny tcp any any access-list 104 permit udp host 10.0.0.3 any access-list 110 permit tcp host 10.0.0.2 eq www any access-list 108 permit tcp any eq ftp any
A. The ACL 110 needs to be changed to port 80
B. The ACL for FTP must be before the ACL 110
C. The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router D. The ACL 104 needs to be first because is UDP
Computers and Technology
1 answer:
koban [17]4 years ago
5 0

Answer:

The correct selection is the letter C. The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router.

Explanation:

In this case, the letter C is the right answer because with the first ACL exactly:

access-list 102 deny tcp any any

We are denying all traffic with the next line deny tcp any any, in this case, the others line are being ignored.

access-list 104 permit udp host 10.0.0.3 any

access-list 110 permit tcp host 10.0.0.2 eq www any

access-list 108 permit tcp any eq ftp any

For that nobody can access to the internet, the security administrator of ABC must change the first ACL.

You might be interested in
Anna is making a presentation on the top five most visited cities in her state. she wants to make sure that she does not put in
andrey2020 [161]
Outline View. This view shows only the text of all the slides in the presentation on the left pane, enabling Anna to see whether she has put too much information or not.  She can also directly edit the the text  and simultaneously see its effect on the slide.  
8 0
3 years ago
Read 2 more answers
What is the most important reason to create a backup of your files somewhere other than your computer
Marizza181 [45]
The most important reason we should make a backup of our files on a USB or other device is in case our computer suddenly dies. If something in it goes bad and it stops working, you will have then lost everything on your computer. But, if you make a save, you can buy another computer and upload everything onto the new one.
6 0
4 years ago
Establishing a telephone call would be impossible without signaling.<br><br> True or False
musickatia [10]

Answer:  True.

Explanation:

When a user wants to make a phone call, he needs to inform to the called party, that he wants to call him.

The only way to do this, is setting up a connection between the two phones, which is started by the calling party informing to the phone switch which is directly connected to, that he wants to make a call, picking up the phone, which modifies his connection state, making him available for calling.

The switch then signals him (sending him an audible call tone) so he can send the digits that identify the called party.

When the destination switch identifies the called user, signals him also (sending in this case a ringing tone).

When he picks up his phone, answering  the call, the connection is set up, and both people can talk each other.

Without all this signaling process, it would be completely impossible to set up the call.

6 0
3 years ago
What's a good online University to attended for cyber security certificate.?
IrinaK [193]

Answer:

If your in the UK, a great university to attend is Lancaster University for a cyber security certificate.

Explanation:

8 0
3 years ago
Answer 7(a)<br> please need help
Yuki888 [10]

Answer: its like the brain. when you plug in your keyboard it acts like a brain. when you want to do something, your brain sends a message to the that part of your body.

Explanation:

6 0
3 years ago
Other questions:
  • What most distinguishes projects with a strong need for computer animation from projects without such a strong need?
    8·1 answer
  • In this program you will read in the number of seconds and convert it to days, hours, minutes and remaining seconds. Your progra
    10·1 answer
  • Gathering information with your eyes is called
    13·2 answers
  • The three devices you are going to install are a 2u server, a 1u keyboard tray, and an 8u space for a rack mounted moitor. Given
    6·1 answer
  • Which statement is false? Classes are reusable software components. A class is to an object as a blueprint is to a house. Perfor
    6·1 answer
  • Destinguish between qualitative data and quantitave
    12·1 answer
  • What word matches with this
    14·1 answer
  • Find the quotient. 2.5 ÷ 5
    8·2 answers
  • Whats worth more in adopt me- A Mega Owl or a Mega Frost Dragon?
    8·2 answers
  • Which factors have increased the need for the latest cybersecurity technologies?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!