Answer Posted / jitendra
shaen u r right but it is not like that what are u telling
in the 4 point all are included in these three part.
1 One access list per protocol per direction.
2 Standard IP access lists should be applied closest
to the
destination.
3 Extended IP access lists should be applied closest
to the source
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
how we update the IOS version with the help of TFTP?
What is the mau?
What is subnetting? Why is it used?
How does RIP differ from IGRP?
What is the difference between cross cable and straight cable?
Wild card mask always in odd value or even?
How are straight and crossable cables different from each other?
What is the difference among straight cable, cross cable and rollover cable?
What does data packets consist of?
What is the beaconing?
What is the difference between the switch, hub, and router?
What purpose does aging serve in a link state protocol?
What is the difference between csma/cd?
What are the steps of data encapsulation?
Suppose we are having two Switches i.e. Switch1 & Switch2 Port1 of Switch1 is Connected to Uplink and switch2 is also connected to switch1? So 1>Is there is any loop? 2>How we come to know that there is a loop created? 3>If we add Switch3 to switch2 then there is a possibility of loop Creation?