1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
4 years ago
11

The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host 10.0.0.3. Al

so he needs to permit all FTP traffic to the rest of the network and deny all other traffic. After he applied his ACL configuration in the router nobody can access to the ftp and the permitted hosts cannot access to the Internet. According to the next configuration what is happening in the network? access-list 102 deny tcp any any access-list 104 permit udp host 10.0.0.3 any access-list 110 permit tcp host 10.0.0.2 eq www any access-list 108 permit tcp any eq ftp any
A. The ACL 110 needs to be changed to port 80
B. The ACL for FTP must be before the ACL 110
C. The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router D. The ACL 104 needs to be first because is UDP
Computers and Technology
1 answer:
koban [17]4 years ago
5 0

Answer:

The correct selection is the letter C. The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router.

Explanation:

In this case, the letter C is the right answer because with the first ACL exactly:

access-list 102 deny tcp any any

We are denying all traffic with the next line deny tcp any any, in this case, the others line are being ignored.

access-list 104 permit udp host 10.0.0.3 any

access-list 110 permit tcp host 10.0.0.2 eq www any

access-list 108 permit tcp any eq ftp any

For that nobody can access to the internet, the security administrator of ABC must change the first ACL.

You might be interested in
What happens when a magnet is close to a iron nail?
kykrilka [37]
Hello
It will attach because of the magnetic filed
have a nice day
6 0
3 years ago
How does information technology most benefit people’s personal and professional lives?
ozzi

As many as 79% of employees now “work on virtual teams,” be it by email, online collaboration, messaging, video conferences, or some combination of any of the above. A 2013 Pew Research study found “94% of jobholders are Internet users.” This includes full-time, part-time, and freelance workers in technology companies, big corporations, and small businesses, who work in cities, the suburbs, rural America, and everywhere in between.

For most of the last century, communicating professionally meant writing letters, sending faxes, or spending hours on the phone. Not anymore. Email is now the primary means of communication in the modern workplace. We are communicating more, faster, and better than ever before. And employers have been reaping the benefits. A major report cited by British newspaper The Telegraph found that the incorporation of technology into the workplace has led to an “84% increase in productivity per hour for office workers since the 1970s.” The major influencers? Email, business software, and yes, even cell phones.


3 0
3 years ago
Read 2 more answers
Universal Containers requires that all users add at least one Product Option from the Maintenance Feature to a bundle.
zmey [24]

Answer

Set the Max Options for “Maintenance” to be one. Set the Min Options to one & Max Options to two for “Support”.

Explanation:

the Admin set up these requirements for the user using Set the Max Options for “Maintenance” to be one. Set the Min Options to one & Max Options to two for “Support”. Since users must select at least one and no more than two Product Options from the Support Feature and Product Option from the Maintenance Feature to a bundle.

6 0
3 years ago
Jacob is a website designer. Whenever his company takes on a new project, Jacob takes the initiative and comes up with ideas and
Troyanec [42]
Eating a potato is what hes using
3 0
3 years ago
Disrupting a business's ability to conduct electronic commerce is cönsidered an act of
aalyn [17]

Answer:

Digital Restrictions

Explanation:

This is the process that arises as a result of not meeting specific ethical standards and procedures for operating an online business on the form of electronic commerce. Such situation could be as a result of important factors like:

1. Unduly registered or incorporated businesses

2. Lack of patent or trademark to shown authenticity of product or services

3. Inability to provide certified prove of ownership to avoid fraudulent acts and others.

7 0
3 years ago
Other questions:
  • Identify the six components of an information system. Which are most directly affected by the study of computer security? Which
    8·1 answer
  • A ____ is a text document written in HTML.
    13·1 answer
  • Company XYZ has a new employee named John Anderson. His employee ID is XYZ1234. His email address will be <a href="/cdn-cgi/l/em
    10·1 answer
  • Which is an unethical use of technology and resources at the workplace?
    13·2 answers
  • Add a new row to a table by clicking in the
    10·1 answer
  • A(n) ____ investigation tracks all elements of an attack, including how the attack began, what intermediate devices were used du
    5·1 answer
  • Graphic software task​
    7·1 answer
  • ________________, _______________ and ___________ are what you see when you open Excel
    15·1 answer
  • You can resize a row in a table by dragging the ____.
    13·1 answer
  • Can somebody please help me with these few questions?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!