1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorLugansk [536]
3 years ago
9

How do ACLs work on a router?

Computers and Technology
1 answer:
serg [7]3 years ago
6 0

Answer:

An ACL is a list of permit or deny rules detailing what can or can't enter or leave the interface of a router. Every packet that attempts to enter or leave a router must be tested against each rule in the ACL until a match is found. If no match is found, then it will be denied.

Explanation:

PLEASE MARK ME AS BRAINLIEST

You might be interested in
Mention 5 types of assembly language​
EleoNora [17]

Answer:

types of assembly languages:

CISC: Complex Instruction-Set Computer

RISC: Reduced Instruction-Set Computer

DSP: Digital Signal Processor

VLIW: Very Long Instruction Word

Explanation:

5 0
2 years ago
What controls can be found on the File tab of Microsoft PowerPoint? Check all that apply. Help Print Track Open Insert Save
Sophie [7]

Answer:

Help

Print

Open

Save

Explanation:

5 0
2 years ago
What's the best definition of financial literacy?
8090 [49]

Answer:

defines personal financial literacy as "the ability to use knowledge and skills to manage financial resources effectively for a lifetime of financial well-being.\

Explanation: thats it

5 0
3 years ago
Which of the following best describes application software? coordinates hardware components provides system utilities like the c
Bezzdna [24]

Answer:

the answer is c

Explanation:

4 0
4 years ago
Read 2 more answers
How many bits are required to write decimal number?
Aleks [24]
There is a amount of 1,00
6 0
3 years ago
Other questions:
  • The letters G,S and C are all examples of what Microsoft Word feature?
    12·1 answer
  • PLEASE HELP ME ASP!!!
    11·2 answers
  • Which computer device is used to capture or copy a photograph to place in a report?
    14·1 answer
  • If it is impractical to place guest users in a secure network, isolated from the production network by firewall barriers, then:
    14·1 answer
  • Use the ______ attribute to configure the browser to render default table and table cell borders.
    12·1 answer
  • Knowledge management software helps companies preserve the knowledge gained through the use of information so that future users
    15·2 answers
  • What are some other features of sending attachments in Outlook 2016? Check all that apply.
    9·2 answers
  • Which of the following protocols help IP in multicast service?
    9·2 answers
  • Write, in your own words, a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and
    10·1 answer
  • Assume you have written a method with the header num yourMethod(string name, num code). The method's type is ____ .
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!