which group of commands would be the best choice to allow only the IP address 172.16.3.3 to have Telnet access
Recently, unauthorized users have used Telnet to gain access to the company router. As the network administrator, you want to configure and apply an access list to allow Telnet access to the router, but only from your computer. Please consider the problem carefully, which group of commands would be the best choice to allow only the IP address 172.16.3.3 to have Telnet access to the router?
How will the above access lists affect traffic?
On your newly installed router, you apply the access list illustrated below to interface Ethernet0 on a router. The interface is connected to the 192.168.1.8/29 LAN.
How will the above access lists affect traffic?
Which protocol is an open standard protocol framework that is commonly used in VPNs to provide secure end-to-e
Which protocol is an open standard protocol framework that is commonly used in VPNs to provide secure end-to-end connections?
What command should be issued to accomplish this task?
A network administrator wants to add a line to an access list that will block only Telnet access by the hosts on subnet 192.168.1.128/28 to the server at 192.168.1.5. What command should be issued to accomplish this task?
How will the above access lists affect traffic?
The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN:
How will the above access lists affect traffic?
What is the effect of the following access list condition?
What is the effect of the following access list condition?
What three pieces of information can be used in an extended access list to filter traffic?
What three pieces of information can be used in an extended access list to filter traffic? (Choose three.)
Which the following command would implement the access list on the interface of router2?
As the network administrator, you have been instructed to prevent all traffic originating on the Router 1 LAN from entering the router2. Which the following command would implement the access list on the interface of router2?
Which one of the following commands would you use?
You are securing a network and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?
Which of the following access list statements are necessary to accomplish these goals?
Refer to the graphic. Assuming the following goals:
1) allow Telnet from the Internet to the HR server
2) allow HTTP access from the Internet to the web server
3) all other traffic from the Internet should be blocked
Which of the following access list statements are necessary to accomplish these goals? (Choose two.)