Deck 10: Access Lists

ملء الشاشة (f)
exit full mode
سؤال
Regarding extended IP access lists, the ____ keyword is short for a wildcard mask of 0.0.0.0.

A) host
B) any
C) none
D) all
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
If you create and apply the lists and they have the intended results, you can cancel the scheduled reload with the ____ command.

A) reload 0
B) reload abort
C) reload cancel
D) reload off
سؤال
To apply the inbound access list 1 to an interface, you use the following command: ____.

A) ip access-group 1 out
B) ip access-group 1 int
C) ip access-group 1 ext
D) ip access-group 1 in
سؤال
It is possible to replace the 0.0.0.0 255.255.255.255 entry, which represents all hosts and all networks, with the ____ keyword.

A) all
B) any
C) each
D) none
سؤال
Access lists begin working the second they are applied to an interface.
سؤال
With the ____ command, an administrator can schedule the router to reload in a certain number of minutes, hours, or even days.

A) interval
B) refresh
C) restart
D) reload
سؤال
To name a standard IP access list, use the following syntax: ____ .

A) ip access-list named [name]
B) named access-list standard [name]
C) ip access-list standard [name]
D) ip named-access-list [name]
سؤال
With careful planning, you can create access lists that control which traffic crosses particular links, and which segments of your network will have access to others.
سؤال
The following command sets an outbound access list filter: ____.

A) ip access-group 1 ext
B) ip access-group 1 out
C) ip access-group 1 int
D) ip access-group 1 in
سؤال
To view which interfaces have IP access lists set, use the ____ command.

A) show ip in
B) show ip out
C) show ip interface
D) show ip any
سؤال
To remove an extended IP access list from an interface, you enter interface configuration mode and use the ____ command.

A) no ip ext access-group [list #] [in|out]
B) extended no ip access-group [list #] [in|out]
C) no ext access-group [list #] [in|out]
D) no ip access-group [list #] [in|out]
سؤال
You must use the ____ command to save the list after configuration if you want it to survive a router reload.

A) copy reload
B) copy start on
C) copy run start
D) copy run reload
سؤال
To view the access lists defined on your router, use the ____ command.

A) show access-lists
B) show lists
C) display access-lists
D) access-lists show
سؤال
Smart network engineers pay close attention to network traffic flow and security when they design and manage their networks.
سؤال
You can remove individual lines in an access list.
سؤال
Access lists can take the place of more advanced security measures, such as firewalls.
سؤال
When making changes, you must remove the access list, using the ____ command.

A) no access-list [list number]
B) access-list off [list number]
C) off access-list [list number]
D) access-list [list number] no
سؤال
Use the ____ command to remove the application of the list.

A) no accessgroup [ip][list #][direction]
B) no ip [accessgroup][list #][direction]
C) no ip access-list [list #][direction]
D) no ip access-group [list #][direction]
سؤال
Routers use ____ to determine which bits in an address will be significant.

A) wildcard masks
B) access masks
C) list numbers
D) address rules
سؤال
Traffic coming in to "the man in the router," through any of the interfaces, needs to be filtered using ____ traffic filters.

A) outgoing
B) incoming
C) exterior
D) outbound
سؤال
Traffic coming in to the "man in the router," through any of the interfaces, is considered ____________________.
سؤال
The configuration of a(n) ____ is the main difference between the Basic and Advance firewall wizards.

A) NAT server
B) DMZ
C) intranet
D) proxy server
سؤال
The access list ends with an implicit ____________________ statement, which blocks all packets that do not meet the requirements of the access list.
سؤال
What are the rules all access lists follow?
سؤال
What are some of the advantages of using named access lists?
سؤال
Unlike the CLI, the SDM does allow a router to be configured as a firewall. To begin this task, click the ____ icon in the Tasks panel.

A) Firewall and ACL
B) Security Audit
C) Routing
D) NAT
سؤال
____ provides a GUI-based configuration tool for Cisco devices.

A) CLI
B) SDM
C) CCL
D) ACL
سؤال
To name an extended IP access list, use the following syntax: ____ .

A) extended ip named-access-list [name]
B) ip access-list extended [name]
C) named-access-list extended [name]
D) ip access-list named [name]
سؤال
Describe each element of the extended IP access list configuration syntax.
سؤال
____________________ are permit or deny statements that filter traffic based on the source address, destination address, protocol type, and port number of a packet.
سؤال
Describe each element of the standard IP access list configuration syntax.
سؤال
To apply a standard IP named list to an interface, use the following syntax: ____ .

A) ip standard access-group [name] [in | out]
B) ip standard-group [name] [in | out]
C) ip apply access-group [name] [in | out]
D) ip access-group [name] [in | out]
سؤال
Why should you use a text editor to create access lists?
سؤال
Where should you place standard and extended IP access lists?
سؤال
How can you monitor standard IP access lists?
سؤال
____________________ IP access lists filter network traffic based on the source IP address only.
سؤال
Access lists to block a router's outward delivery must be applied as ____________________ filters.
سؤال
How can you monitor extended IP access lists?
سؤال
SDM allows you to easily create a standard or an extended access list or, as it is known in the SDM, a(n) ____.

A) VTY
B) TTY
C) ACL
D) CLI
سؤال
Briefly describe wildcard masks.
سؤال
What kind of tasks can you perform on the SDM's Interfaces and Connection screen?
سؤال
Match between columns
determines which bits of the source address are significant
Partial masking
determines which bits of the source address are significant
Access lists
determines which bits of the source address are significant
Named access lists
determines which bits of the source address are significant
Lack of planning
determines which bits of the source address are significant
Extended IP access lists
determines which bits of the source address are significant
no access-list [list #]
determines which bits of the source address are significant
Single host wildcard mask
determines which bits of the source address are significant
Wildcard mask
determines which bits of the source address are significant
Standard IP access lists
one of the most common problems associated with access lists
Partial masking
one of the most common problems associated with access lists
Access lists
one of the most common problems associated with access lists
Named access lists
one of the most common problems associated with access lists
Lack of planning
one of the most common problems associated with access lists
Extended IP access lists
one of the most common problems associated with access lists
no access-list [list #]
one of the most common problems associated with access lists
Single host wildcard mask
one of the most common problems associated with access lists
Wildcard mask
one of the most common problems associated with access lists
Standard IP access lists
the mixing of 0s and 1s in a wildcard mask octet
Partial masking
the mixing of 0s and 1s in a wildcard mask octet
Access lists
the mixing of 0s and 1s in a wildcard mask octet
Named access lists
the mixing of 0s and 1s in a wildcard mask octet
Lack of planning
the mixing of 0s and 1s in a wildcard mask octet
Extended IP access lists
the mixing of 0s and 1s in a wildcard mask octet
no access-list [list #]
the mixing of 0s and 1s in a wildcard mask octet
Single host wildcard mask
the mixing of 0s and 1s in a wildcard mask octet
Wildcard mask
the mixing of 0s and 1s in a wildcard mask octet
Standard IP access lists
the default for standard IP access lists
Partial masking
the default for standard IP access lists
Access lists
the default for standard IP access lists
Named access lists
the default for standard IP access lists
Lack of planning
the default for standard IP access lists
Extended IP access lists
the default for standard IP access lists
no access-list [list #]
the default for standard IP access lists
Single host wildcard mask
the default for standard IP access lists
Wildcard mask
the default for standard IP access lists
Standard IP access lists
removes an access list
Partial masking
removes an access list
Access lists
removes an access list
Named access lists
removes an access list
Lack of planning
removes an access list
Extended IP access lists
removes an access list
no access-list [list #]
removes an access list
Single host wildcard mask
removes an access list
Wildcard mask
removes an access list
Standard IP access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
Partial masking
built into the Cisco IOS; solve many problems associated with traffic flow and security
Access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
Named access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
Lack of planning
built into the Cisco IOS; solve many problems associated with traffic flow and security
Extended IP access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
no access-list [list #]
built into the Cisco IOS; solve many problems associated with traffic flow and security
Single host wildcard mask
built into the Cisco IOS; solve many problems associated with traffic flow and security
Wildcard mask
built into the Cisco IOS; solve many problems associated with traffic flow and security
Standard IP access lists
use names instead of numbers to identify themselves
Partial masking
use names instead of numbers to identify themselves
Access lists
use names instead of numbers to identify themselves
Named access lists
use names instead of numbers to identify themselves
Lack of planning
use names instead of numbers to identify themselves
Extended IP access lists
use names instead of numbers to identify themselves
no access-list [list #]
use names instead of numbers to identify themselves
Single host wildcard mask
use names instead of numbers to identify themselves
Wildcard mask
use names instead of numbers to identify themselves
Standard IP access lists
filter by source IP address, destination IP address, protocol type, and application port number
Partial masking
filter by source IP address, destination IP address, protocol type, and application port number
Access lists
filter by source IP address, destination IP address, protocol type, and application port number
Named access lists
filter by source IP address, destination IP address, protocol type, and application port number
Lack of planning
filter by source IP address, destination IP address, protocol type, and application port number
Extended IP access lists
filter by source IP address, destination IP address, protocol type, and application port number
no access-list [list #]
filter by source IP address, destination IP address, protocol type, and application port number
Single host wildcard mask
filter by source IP address, destination IP address, protocol type, and application port number
Wildcard mask
filter by source IP address, destination IP address, protocol type, and application port number
Standard IP access lists
permit or deny packets based only on the source address
Partial masking
permit or deny packets based only on the source address
Access lists
permit or deny packets based only on the source address
Named access lists
permit or deny packets based only on the source address
Lack of planning
permit or deny packets based only on the source address
Extended IP access lists
permit or deny packets based only on the source address
no access-list [list #]
permit or deny packets based only on the source address
Single host wildcard mask
permit or deny packets based only on the source address
Wildcard mask
permit or deny packets based only on the source address
Standard IP access lists
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Access Lists
1
Regarding extended IP access lists, the ____ keyword is short for a wildcard mask of 0.0.0.0.

A) host
B) any
C) none
D) all
A
2
If you create and apply the lists and they have the intended results, you can cancel the scheduled reload with the ____ command.

A) reload 0
B) reload abort
C) reload cancel
D) reload off
C
3
To apply the inbound access list 1 to an interface, you use the following command: ____.

A) ip access-group 1 out
B) ip access-group 1 int
C) ip access-group 1 ext
D) ip access-group 1 in
D
4
It is possible to replace the 0.0.0.0 255.255.255.255 entry, which represents all hosts and all networks, with the ____ keyword.

A) all
B) any
C) each
D) none
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
Access lists begin working the second they are applied to an interface.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
With the ____ command, an administrator can schedule the router to reload in a certain number of minutes, hours, or even days.

A) interval
B) refresh
C) restart
D) reload
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
To name a standard IP access list, use the following syntax: ____ .

A) ip access-list named [name]
B) named access-list standard [name]
C) ip access-list standard [name]
D) ip named-access-list [name]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
With careful planning, you can create access lists that control which traffic crosses particular links, and which segments of your network will have access to others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
The following command sets an outbound access list filter: ____.

A) ip access-group 1 ext
B) ip access-group 1 out
C) ip access-group 1 int
D) ip access-group 1 in
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
To view which interfaces have IP access lists set, use the ____ command.

A) show ip in
B) show ip out
C) show ip interface
D) show ip any
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
To remove an extended IP access list from an interface, you enter interface configuration mode and use the ____ command.

A) no ip ext access-group [list #] [in|out]
B) extended no ip access-group [list #] [in|out]
C) no ext access-group [list #] [in|out]
D) no ip access-group [list #] [in|out]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
You must use the ____ command to save the list after configuration if you want it to survive a router reload.

A) copy reload
B) copy start on
C) copy run start
D) copy run reload
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
To view the access lists defined on your router, use the ____ command.

A) show access-lists
B) show lists
C) display access-lists
D) access-lists show
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
Smart network engineers pay close attention to network traffic flow and security when they design and manage their networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
You can remove individual lines in an access list.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
Access lists can take the place of more advanced security measures, such as firewalls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
When making changes, you must remove the access list, using the ____ command.

A) no access-list [list number]
B) access-list off [list number]
C) off access-list [list number]
D) access-list [list number] no
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
Use the ____ command to remove the application of the list.

A) no accessgroup [ip][list #][direction]
B) no ip [accessgroup][list #][direction]
C) no ip access-list [list #][direction]
D) no ip access-group [list #][direction]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
Routers use ____ to determine which bits in an address will be significant.

A) wildcard masks
B) access masks
C) list numbers
D) address rules
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
Traffic coming in to "the man in the router," through any of the interfaces, needs to be filtered using ____ traffic filters.

A) outgoing
B) incoming
C) exterior
D) outbound
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Traffic coming in to the "man in the router," through any of the interfaces, is considered ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
The configuration of a(n) ____ is the main difference between the Basic and Advance firewall wizards.

A) NAT server
B) DMZ
C) intranet
D) proxy server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
The access list ends with an implicit ____________________ statement, which blocks all packets that do not meet the requirements of the access list.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
What are the rules all access lists follow?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
What are some of the advantages of using named access lists?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
Unlike the CLI, the SDM does allow a router to be configured as a firewall. To begin this task, click the ____ icon in the Tasks panel.

A) Firewall and ACL
B) Security Audit
C) Routing
D) NAT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
____ provides a GUI-based configuration tool for Cisco devices.

A) CLI
B) SDM
C) CCL
D) ACL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
To name an extended IP access list, use the following syntax: ____ .

A) extended ip named-access-list [name]
B) ip access-list extended [name]
C) named-access-list extended [name]
D) ip access-list named [name]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Describe each element of the extended IP access list configuration syntax.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
____________________ are permit or deny statements that filter traffic based on the source address, destination address, protocol type, and port number of a packet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
Describe each element of the standard IP access list configuration syntax.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
To apply a standard IP named list to an interface, use the following syntax: ____ .

A) ip standard access-group [name] [in | out]
B) ip standard-group [name] [in | out]
C) ip apply access-group [name] [in | out]
D) ip access-group [name] [in | out]
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
Why should you use a text editor to create access lists?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
Where should you place standard and extended IP access lists?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
How can you monitor standard IP access lists?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
____________________ IP access lists filter network traffic based on the source IP address only.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Access lists to block a router's outward delivery must be applied as ____________________ filters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
How can you monitor extended IP access lists?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
SDM allows you to easily create a standard or an extended access list or, as it is known in the SDM, a(n) ____.

A) VTY
B) TTY
C) ACL
D) CLI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Briefly describe wildcard masks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
What kind of tasks can you perform on the SDM's Interfaces and Connection screen?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
determines which bits of the source address are significant
Partial masking
determines which bits of the source address are significant
Access lists
determines which bits of the source address are significant
Named access lists
determines which bits of the source address are significant
Lack of planning
determines which bits of the source address are significant
Extended IP access lists
determines which bits of the source address are significant
no access-list [list #]
determines which bits of the source address are significant
Single host wildcard mask
determines which bits of the source address are significant
Wildcard mask
determines which bits of the source address are significant
Standard IP access lists
one of the most common problems associated with access lists
Partial masking
one of the most common problems associated with access lists
Access lists
one of the most common problems associated with access lists
Named access lists
one of the most common problems associated with access lists
Lack of planning
one of the most common problems associated with access lists
Extended IP access lists
one of the most common problems associated with access lists
no access-list [list #]
one of the most common problems associated with access lists
Single host wildcard mask
one of the most common problems associated with access lists
Wildcard mask
one of the most common problems associated with access lists
Standard IP access lists
the mixing of 0s and 1s in a wildcard mask octet
Partial masking
the mixing of 0s and 1s in a wildcard mask octet
Access lists
the mixing of 0s and 1s in a wildcard mask octet
Named access lists
the mixing of 0s and 1s in a wildcard mask octet
Lack of planning
the mixing of 0s and 1s in a wildcard mask octet
Extended IP access lists
the mixing of 0s and 1s in a wildcard mask octet
no access-list [list #]
the mixing of 0s and 1s in a wildcard mask octet
Single host wildcard mask
the mixing of 0s and 1s in a wildcard mask octet
Wildcard mask
the mixing of 0s and 1s in a wildcard mask octet
Standard IP access lists
the default for standard IP access lists
Partial masking
the default for standard IP access lists
Access lists
the default for standard IP access lists
Named access lists
the default for standard IP access lists
Lack of planning
the default for standard IP access lists
Extended IP access lists
the default for standard IP access lists
no access-list [list #]
the default for standard IP access lists
Single host wildcard mask
the default for standard IP access lists
Wildcard mask
the default for standard IP access lists
Standard IP access lists
removes an access list
Partial masking
removes an access list
Access lists
removes an access list
Named access lists
removes an access list
Lack of planning
removes an access list
Extended IP access lists
removes an access list
no access-list [list #]
removes an access list
Single host wildcard mask
removes an access list
Wildcard mask
removes an access list
Standard IP access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
Partial masking
built into the Cisco IOS; solve many problems associated with traffic flow and security
Access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
Named access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
Lack of planning
built into the Cisco IOS; solve many problems associated with traffic flow and security
Extended IP access lists
built into the Cisco IOS; solve many problems associated with traffic flow and security
no access-list [list #]
built into the Cisco IOS; solve many problems associated with traffic flow and security
Single host wildcard mask
built into the Cisco IOS; solve many problems associated with traffic flow and security
Wildcard mask
built into the Cisco IOS; solve many problems associated with traffic flow and security
Standard IP access lists
use names instead of numbers to identify themselves
Partial masking
use names instead of numbers to identify themselves
Access lists
use names instead of numbers to identify themselves
Named access lists
use names instead of numbers to identify themselves
Lack of planning
use names instead of numbers to identify themselves
Extended IP access lists
use names instead of numbers to identify themselves
no access-list [list #]
use names instead of numbers to identify themselves
Single host wildcard mask
use names instead of numbers to identify themselves
Wildcard mask
use names instead of numbers to identify themselves
Standard IP access lists
filter by source IP address, destination IP address, protocol type, and application port number
Partial masking
filter by source IP address, destination IP address, protocol type, and application port number
Access lists
filter by source IP address, destination IP address, protocol type, and application port number
Named access lists
filter by source IP address, destination IP address, protocol type, and application port number
Lack of planning
filter by source IP address, destination IP address, protocol type, and application port number
Extended IP access lists
filter by source IP address, destination IP address, protocol type, and application port number
no access-list [list #]
filter by source IP address, destination IP address, protocol type, and application port number
Single host wildcard mask
filter by source IP address, destination IP address, protocol type, and application port number
Wildcard mask
filter by source IP address, destination IP address, protocol type, and application port number
Standard IP access lists
permit or deny packets based only on the source address
Partial masking
permit or deny packets based only on the source address
Access lists
permit or deny packets based only on the source address
Named access lists
permit or deny packets based only on the source address
Lack of planning
permit or deny packets based only on the source address
Extended IP access lists
permit or deny packets based only on the source address
no access-list [list #]
permit or deny packets based only on the source address
Single host wildcard mask
permit or deny packets based only on the source address
Wildcard mask
permit or deny packets based only on the source address
Standard IP access lists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.