Which statement best defines access list placement, Computer Networking

Assignment Help:

When using access lists, it is important where those access lists are placed. Which Statement best defines access list placement

Ans) Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. Standard access lists don't state the destination address. 

 


Related Discussions:- Which statement best defines access list placement

Asynchronous or statistical time division multiplexing, Asynchronous or Sta...

Asynchronous or Statistical Time Division Multiplexing As we  have seen  synchronous  TDM does not  guarantee that the full capacity of a link in sued. In fact it is more like

Explain about domain name system, Q. Explain about Domain Name System? ...

Q. Explain about Domain Name System? -In the past, mapping of IP addresses was static using a host file -Impossible in today's dynamic environment -Domain Name System (DN

How is it different than bootp or rarp, Bootp protocol normally use it in d...

Bootp protocol normally use it in dhcp protocol, it is configured manually in order to give ip add or there relvent host. Rarp is a work just opposite of Arp. Rarp stand for rev

What do you mean by platform independence, What do you mean by platform ind...

What do you mean by platform independence? Platform independence means that we can write and compile the java code in one platform (eg Windows) and can implement the class in a

Explain classification of computer network by range, Question 1 Explain cl...

Question 1 Explain classification of computer Network by range Question 2 Explain three major problems of Transmission lines Question 3 What is the maximum data rate of

Broadcast and multicast , Broadcast and Multicast : Broadcast and Mult...

Broadcast and Multicast : Broadcast and Multicast :In the broadcast interconnection network, at one time one node transfer the data and all other nodes get that data.  Broadca

Characteristics of the user private group scheme, Question: a) The cpi...

Question: a) The cpio utility has three operating modes. What are they? b) The characters of the permission string are broken up into three groups of three characters. Ex

Implementation of distributed systems, Distributed systems are composed of ...

Distributed systems are composed of a number of physically separate machines connected by one or more communication links. Unlike parallel systems, there's no shared clock or memor

Subtract two from number of hosts, Why do we require to subtract two from n...

Why do we require to subtract two from number of hosts?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd