Question

As a network technician at ASU you are configuring access lists on an interface of a Cisco router. You use multiple acce...

As a network technician at ASU you are configuring access lists on an interface of a Cisco router. You use multiple access lists. Which of the following statements is valid?

There is no limit to the number of access lists that can be applied to an interface, as long as they are applied in order from most specific to most general.

Cisco IOS allows only one access list to be applied to an interface.

One access list may be configured per direction for each Layer 3 protocol configured on an interface.

Up to three access lists per protocol can be applied to a single interface.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer:

Option 3: One access list may be configured per direction for each Layer 3 protocol configured on an interface.

because there re some rules of access list:

• Only one access list per interface, per protocol, per layer3 protocol and per direction is allowed.

• An access list must contain at least one permit statement or all packets are denied entry into the network.

• Standard access lists and extended access lists cannot have the same name.

• If an access list is referenced by a name, but the access list does not exist, all packets pass. An interface or command with an empty access list applied to it permits all traffic into the network.

Add a comment
Know the answer?
Add Answer to:
As a network technician at ASU you are configuring access lists on an interface of a Cisco router. You use multiple acce...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • In this assignment, you design a simple chat room in the form of a network application which uses the services of a TCP/IP computer network. Your design should have a clientserver architecture in whic...

    In this assignment, you design a simple chat room in the form of a network application which uses the services of a TCP/IP computer network. Your design should have a clientserver architecture in which the server is multi-threaded. Then, you need to implement the server-side of the chat-room application in Java (implementing the client-side is optional). The server maintains a list (an ArrayList will work well) of all the active connections. It will listen on a port for a new...

  • 166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls...

    166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

  • Multiple Choice 11. The ________ is the agreed-upon interface between all the software that runs on...

    Multiple Choice 11. The ________ is the agreed-upon interface between all the software that runs on the machine and the hardware that executes it. It allows you to talk to the machine. A) hardware protocol B) software protocol C) machine control architecture D) instruction set architecture 12. A ________ consists of an arithmetic logic unit and a control unit. A) processor B) computer C) register D) program 13. ________ are typically used by companies for specific applications such as data...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • Read this article. Then write a 250 word response on two of the programs you like...

    Read this article. Then write a 250 word response on two of the programs you like the most. Open source business intelligence software 1. BIRT BIRT is an open source BI program that CloudTweaks says is often viewed as the industry standard. BIRT boasts “over 12 million downloads and over 2.5 million developers across 157 countries.” Its users include heavyweights such as Cisco, S1, and IBM (which is also a BIRT sponsor). They also have maturity going for them, as...

  • Quich Books tAss M MULTIPLE CHOICE (2 PTS EACH) CHOOS THE BEST ANSWER 1. The Banking...

    Quich Books tAss M MULTIPLE CHOICE (2 PTS EACH) CHOOS THE BEST ANSWER 1. The Banking section of the Home Page includes which flow chart? A. Payroll flowchart B. Bank Reconciliation flowchart C. Bill Pay flow chart D. None of these 2. Which financial statement below summarizes the financial position of a company? A. Statement of Cash Flows B. Profit &Loss Statement C. Balance Sheet D. Income Statement Which financial statement below summarizes a company's earnings? A. Statement of Cash...

  • phlebotomy 166 Unit Ill: Blood Collection Procedures MATCHING 9-4: SCENARIOS AND VASCULAR ACCESS DEVICES e type...

    phlebotomy 166 Unit Ill: Blood Collection Procedures MATCHING 9-4: SCENARIOS AND VASCULAR ACCESS DEVICES e type of equipment described in the following scenaries with the list of vascular access devices. Scenarios Vascular Access Devices A nurse is collecting a blood gas specimen A. Arterial line (A-line) from tubing inserted in the underside of a B. Arteriovenous (AV) shunt patient's left wrist on the thumb side. C. Central venous catheter (CVC) D. Implanted port A nurse is palpating an area in...

  • Multiple-Choice Questions (worth two points each) 1. Which of the following describes the process in which...

    Multiple-Choice Questions (worth two points each) 1. Which of the following describes the process in which one adopts patterns of behavior that lead to greater life satisfaction? A. wellness B. health C. social determination D. self-efficacy 2. The Stages of Change Model of health behavior change emphasizes that A. change happens as a process. B. people change only when faced with an illness. C. change occurs only when the environment supports it. D. changes are more effective when based on...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT