Answer Posted / jitendra
shain
ya u r right
but onse u go in the depth ou will find more type of access list
like time based access-list and more
so access-list is basicaly two type onlly
standred and extended
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What does eq means?
What is the name of best path in eigrp protocol?
Is hub intelligent device?
What is the usage of service password encryption?
What is bgp?
Explain the difference between simple authentication and md5?
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
Utilizing RIP, what is the limit when it comes to the number of hops?
What metric does rip use? How is the metric used to indicate an unreachable network?
What is 10base5 ethernet lans?
How do areas benefit a link state inter network?
Your company has been assigned the IP address of 201.222.5.0 and require having 20 subnets. As the company’s network administrator, find the following: a) the subnet mask (2 marks) b) the number of useable subnets (2 marks) c) the subnetwork address for the 4th subnet (2 marks) d) the first usable IP address for the 4th subnet (2 marks) e) the last usable IP address for the 4th subnet (2 marks) f) the broadcast address for the 4th subnet. (2 marks)
Mention the conversion steps of data encapsulation?
What is icmp protocol?
When dr communicate with bdr which multicast ip it use?