1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
4 years ago
11

The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host 10.0.0.3. Al

so he needs to permit all FTP traffic to the rest of the network and deny all other traffic. After he applied his ACL configuration in the router nobody can access to the ftp and the permitted hosts cannot access to the Internet. According to the next configuration what is happening in the network? access-list 102 deny tcp any any access-list 104 permit udp host 10.0.0.3 any access-list 110 permit tcp host 10.0.0.2 eq www any access-list 108 permit tcp any eq ftp any
A. The ACL 110 needs to be changed to port 80
B. The ACL for FTP must be before the ACL 110
C. The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router D. The ACL 104 needs to be first because is UDP
Computers and Technology
1 answer:
koban [17]4 years ago
5 0

Answer:

The correct selection is the letter C. The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router.

Explanation:

In this case, the letter C is the right answer because with the first ACL exactly:

access-list 102 deny tcp any any

We are denying all traffic with the next line deny tcp any any, in this case, the others line are being ignored.

access-list 104 permit udp host 10.0.0.3 any

access-list 110 permit tcp host 10.0.0.2 eq www any

access-list 108 permit tcp any eq ftp any

For that nobody can access to the internet, the security administrator of ABC must change the first ACL.

You might be interested in
Which of the following restricts the ability for individuals to reveal information present in some part of the database?
Anni [7]

Answer:

it would have to be flow control which would be C.

Explanation:

8 0
3 years ago
Most common level of education for a programmer or software developer
shusha [124]

c/c+ also java would be one

8 0
3 years ago
Which of the following is 1000 of a second​
s344n2d4d5 [400]

Answer:

what I don't understand your question

6 0
4 years ago
An algorithm to find the perimeter of a triangle
KiRa [710]

Answer:

step 1- start

step 2- Input a,b,c

step 3 - perimeter = a+b+c

step 4 - Print the perimeter

step 5 - End

5 0
2 years ago
Python: Write a program that prompts the user for a meal: breakfast, lunch, or dinner. Then using if statements and else stateme
Alexeev081 [22]

The program prompts user for the time of meal they will be having and a suggestion made on their behalf. The program is written in python 3 thus :

meal= input('your meal : ')

<em>#prompts</em><em> </em><em>user</em><em> </em><em>to</em><em> </em><em>enter</em><em> </em><em>a</em><em> </em><em>meal</em><em> </em><em>type</em><em> </em>

if meal == 'breakfast' :

<em>#check</em><em> </em><em>if</em><em> </em><em>it's</em><em> </em><em>breakfast</em><em> </em>

print('How about some Avocado')

elif meal == 'lunch' :

<em>#checks</em><em> </em><em>if</em><em> </em><em>it's</em><em> </em><em>lunch</em><em> </em>

print('like some grapes?')

else:

print('would rice be ok?')

<em>A</em><em> </em><em>sample</em><em> </em><em>run</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>program</em><em> </em><em>is</em><em> </em><em>attached</em><em>.</em><em> </em>

<em>Learn</em><em> </em><em>more</em><em> </em><em>:</em><em>brainly.com/question/25531734</em>

8 0
3 years ago
Other questions:
  • Where is the bubble level on a tripod?
    6·2 answers
  • In Python please:
    15·1 answer
  • #include
    9·1 answer
  • Q.No.3. A filling station (gas station) is to be set up for fully automated operation. Drivers swipe their credit card through a
    10·1 answer
  • Text documents images audio clips and software applications are all examples of blank that are stored in files
    8·2 answers
  • What properties make it suitable to be used for supportive frames
    15·1 answer
  • Which kind of testing runs the system in a simulated environment using simulated data?a) validation testing. b) verification tes
    5·1 answer
  • Identify the type of software that should be in main memory in order to use the keyboard? *
    14·1 answer
  • Describe the difference between information poor and information rich society?​
    9·1 answer
  • The Horse table has the following columns:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!