Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Which statement should you use to deny FTP access (only)
from network 210 93 105 0 to network 223 8 151 0?

A. access list 1 deny 210 93 105 0 0 0 0 0 any eq ftp access
list 1 permit any

B. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151
0 0 0 0 255 eq ftp

C. access list 100 deny ip 223 8 151 0 0 0 0 255 any eq ftp
access list 100 permit hp any any

D. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151
0 0 0 0 255 eq ftp access list 100 permit ip any any

Answer Posted / guest

Answer: D

Is This Answer Correct ?    2 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Define autonomous system (as)?

1223


which points are eliminated by the DBSCAN algorithm?

2091


Which protocols are link states?

1156


Explain what is route poisoning?

1286


Define logical topology.

1085


How much hold down time of eigrep protocol?

1167


which defined peer ip address an local subnet belong to crete? (Choose two)

1104


Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router?

1379


How many parts of ping?

1094


How many ways are there to implement VPN architecture?

3660


Define mac address?

1092


What is quality of ipv6?

1195


What are the protocols that are used by every layer of ip/tcp model?

1073


In which protocol supenetting is enable by default?

1164


Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)

1315