you are studying for the cisco ccent certification and are visualizing extended access lists. which three keywords could immediately follow the keywords permit or deny as part of an extended access list? (choose all that apply.)

Answers

Answer 1

The three keywords could immediately follow the keywords permit or deny as part of an extended access list is tcp, udp, ftp.

The common keywords that been used to follow the keywords permit or deny in an extended access list of IPv4 is IP, TCP, UDP, and FTP.

The TCP or transmission control protocol is a protocol that resides in the transport layer that is connection-oriented and reliable.

The UDP or user datagram protocol is one of the TCP/IP transport layer protocols that supports unreliable.

The FTP is file transfer protocol is standard communication protocol used to transfer files from a computer from a server to a client on a computer network. It is within TCP/IP protocol.

The IP can follow keyword permit or deny as part of an extended access list, and when the keyword IP is used, then all TCP/IP protocol will be affected which is TCP, UDP, and FTP.

You question is incomplete, but most probably your full question was

A college student is studying for the Cisco CCENT certification and is visualizing extended access lists. Which three keywords could immediately follow the keywords permit or deny as part of an extended access list? (Choose three.)

www

tcp

udp

icmp

telnet

ftp

Learn more about TCP here:

brainly.com/question/14280351

#SPJ4


Related Questions

Why is it not a good idea for a company to treat employee records with dupli-
cate first and last names as duplicate records?

Answers

Answer:

Maybe several files are titled the name of the client if the client returns to use the company again under different circumstances

Explanation:

As a Manager, you will find it difficult to operate on daily basis without a computer in your office and even at home. Evalauate this statement

Answers

As a manager, operating on a daily basis without a computer in both the office and at home would indeed pose significant challenges. Computers have become an essential tool in modern management practices, enabling efficient communication, data analysis, decision-making, and productivity enhancement.

In the office, a computer allows managers to access critical information, collaborate with team members, and utilize various software applications for tasks such as project management, financial analysis, and report generation. It provides a centralized platform for managing emails, scheduling meetings, and accessing company systems and databases.

Outside the office, a computer at home provides flexibility and convenience for remote work and staying connected. It enables managers to respond to urgent emails, review documents, and engage in virtual meetings. It also allows them to stay informed about industry trends, access online resources for professional development, and maintain a work-life balance through effective time management.

Without a computer, managers would face limitations in accessing and analyzing data, communicating efficiently, coordinating tasks, and making informed decisions. Their productivity and effectiveness may be compromised, and they may struggle to keep up with the demands of a fast-paced, technology-driven business environment.

In conclusion, a computer is an indispensable tool for managers, facilitating their daily operations, communication, and decision-making. Its absence would significantly impede their ability to perform their responsibilities effectively both in the office and at home.

To learn more about Computers, visit:

https://brainly.com/question/32329557

#SPJ11

What is Boolean algebra

Answers

Answer:

Boolean algebra is a division of mathematics that deals with operations on logical values and incorporates binary variables.

Explanation:

The owner tells you that in the future, CSM Tech Publishing might need system fault tolerance to ensure that there's little or no downtime because this critical application will eventually be accessed at all times of the day and night. For now, he's just concerned about getting the system up and running. You check the existing server's capacity and determine that the new application's memory and disk requirements will likely exceed the existing server's 4 GB capabilities. The owner explains that there's enough budget for a new server, so you should plan for growth. As an aside, he mentions that because all his employees sign in at about the same time, the time it takes to sign in has been increasing. You need to come up with specifications for a new server. Describe some hardware features you plan to recommend for this new server, in particular the CPU architecture, number of CPUs, amount of RAM, and disk system. Explain your answers.

Answers

Answer:

Follows are the solution to this question:

Explanation:

New useful server specifications can be defined as follows:  

Space planning is enough to store units should also be available to handle the current load. The goals shall become converted through strategies Security was its key problem, thus the technology must at least be safeguarded by good chemical stability as well as virus protection.

RAM is also to be improved. Its 8 GB is viewed as good. The amount of redskins would increase performance if they had been increased. Numerous CPUs will be connected to a system for the procedure and is as required.

Its hard drive must be linked to structures with such a temperature of 1-2 TB more than. Besides that, the fault-tolerant equipment, tracking tools, reporting tools, audit tools, and data centers are frequently used.

People who make money investing in the stock market.....
A) get certain tax breaks.
B) should sell quickly to avoid taxes.
C) have to pay a fee to keep a stock.
D) must pay taxes on profits.
The answer is D ^^^

Answers

I think its D hope that helped

Answer:

D must pay taxes on profits.

Explanation:

in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4

Answers

Answer:

c)4

Explanation:

Hope it could helps you

windows can communicate with the name resolution server but can't find the host name.
T/F

Answers

True, Windows can communicate with the name resolution server but may not be able to find the host name.

This issue can arise if the host name is not properly registered with the name resolution server, such as DNS, or if there is a connectivity issue between the server and the host.

#SPJ11

Lear more about DNS server and host name :- https://brainly.com/question/28849640

True.

It is possible for

Windows

to communicate with the name resolution

server

but not be able to find the host name. This can occur if the server does not have a record of the requested

host name or if there is an issue with the server's configuration. If Windows can communicate with the name resolution server (DNS), but can't find the host name, it could be due to a few different issues, such as:

1. DNS cache: There may be outdated or incorrect information cached in the DNS resolver cache on the Windows computer. To resolve this, you can try flushing the DNS cache by running the command "ipconfig /flushdns" in the command prompt.

2. DNS server settings: The DNS server settings may be misconfigured on the Windows computer, causing it to look for the wrong DNS server or use incorrect settings. You can check the DNS server settings in the Network and Sharing Center or Network Connections settings.

3. Hosts file: The host name may be incorrectly configured in the hosts file on the Windows computer. You can check the hosts file by opening it in a text editor and ensuring that the correct IP address and host name are listed.

4. Firewall settings: There may be firewall settings on the Windows computer or network that are blocking the communication with the host name. Check the firewall settings to make sure the necessary exceptions are added.

5. Network connectivity: There may be a network connectivity issue preventing the Windows computer from reaching the host name. Check the network connectivity and ensure that the host name is still active on the network.

Why Windows Server operating systems are a popular choice for a network:- https://brainly.com/question/12510017

#SPJ11

edhesive 6.3 Code Practice

Answers

Can you ask the question in a more detail way

shoshana is a network technician for a mid-sized organization. she is configuring firewall rules. she is in a firewall's graphical interface and sets a rule as tcp, 192.168.42.0/24, any, any, 443, allow. in what order is this rule organizing protocols, source addresses, source and target ports, and actions?

Answers

Shoshana's rule allows TCP traffic from any source port within the IP address range 192.168.42.0/24 to reach destination port 443, enabling secure web Communication within her organization. Shoshana, as a network technician, is configuring firewall rules for her organization

Shoshana, as a network technician, is configuring firewall rules for her organization. The rule she has set is organized in the following order:

1. Protocol: The rule specifies the Transmission Control Protocol (TCP) as the communication protocol being used. This protocol ensures reliable and ordered delivery of data between devices.

2. Source Addresses: The rule defines the source IP addresses as 192.168.42.0/24. This notation represents an IP address range from 192.168.42.0 to 192.168.42.255, using a 24-bit subnet mask.

3. Source Ports: The rule allows for any source port to initiate communication. By using "any," Shoshana ensures that the source port number is not restricted, allowing traffic from a variety of applications.

4. Destination Ports: The rule specifies the destination port as 443. This is the default port for HTTPS traffic, ensuring secure web communication.

5. Action: Finally, the rule sets the action as "allow," permitting traffic that matches the specified protocol, source address range, source ports, and destination port to pass through the firewall.

In summary, Shoshana's rule allows TCP traffic from any source port within the IP address range 192.168.42.0/24 to reach destination port 443, enabling secure web communication within her organization.

To Learn More About Firewall rules

https://brainly.com/question/30265115

#SPJ11

A favorably adjudicated background investigation is required for access to classified information

a. True
b. False

Answers

A favorably adjudicated background investigation is required for access to classified information: A. True.

What is a classified source material?

In Computer technology, a classified source material is sometimes referred to as classified information and it  can be defined as an information source that comprises very important, restricted, and sensitive information that must only be shared and disseminated secretly with authorized persons.

What is an adjudicative process?

In Computer technology, an adjudicative process can be defined as a strategic process which typically involves an examination and background investigation of a sufficient period of the life of a person, in order to make an affirmative determination that he or she is eligible for a security clearance and access to a classified source material or classified information.  

Read more on classified source material here: brainly.com/question/15346759

#SPJ1

Explain why certain locations in the
United States are in "dead zones” where cell
phones cannot send or receive messages.

Answers

Answer:

Since cell towers are not uniformly distributed, certain areas will fall into a dead zone. ... Obstructions: Trees, hills, mountains, high rise buildings and certain building materials tend to interfere with the transmission of cell signals and may block them out entirely.

The BETWEEN operator is exclusive; it includes all numbers between the lower and higher numbers, but excludes the lower and higher numbers themselves.
a. true
b. false

Answers

False cause I’d dosent have to exclude lower and higher numbers

{Opportunity for 100 point!}
Answer this question (Using Python):

{Opportunity for 100 point!}Answer this question (Using Python):

Answers

It whould be 5.0 mill

What are some commands found in the Sort dialog box? Check all that apply.

add level
rename level
edit level
delete level
copy level
move up or down

Answers

Answer:

A. add level

D. Delete level

E. Copy level

F. Move up or down

Explanation:

I just did it on edg. 2020

Answer:

A, D, E, F

Explanation:

Stella has captured this candid photograph of a man who was reunited with his son. She has used facial retouching in each of the images. Which images could she print along with the mans interview?

Stella has captured this candid photograph of a man who was reunited with his son. She has used facial

Answers

Answer: The last picture it looks better.

Explanation: Welcome!

Answer:

4

Explanation:

the code below using basic loop. please edit the codes, use cursor for loop ("for your_index in cursor_name loop"). the output of your new codes should be the same as the original program.

Answers

You can change the code as follows to go from a simple loop to a cursor for loop:cx_Oracle import PythonCreate a database connection by entering the following information: connection =

cx_Oracle.connect("your_username", "your_password", "your_host:your_port/your_service").Make a cursor by entering cursor = connection.cursor().

# Run the cursor for the query."SELECT column1, column2, column3 FROM your_table"

# Use a cursor for loop for row in cursor to fetch and handle the results:    Value in column 1 = row [0]    row[1] = column2_value    row[2] column3_value      Process the data as necessary (apply operations or computations tothe values you've retrieved).

learn more about connection here :

https://brainly.com/question/28337373

#SPJ11

69) Software programs were unprotected by copyright law until the early 1990s.

Answers

Prior to the early 1990s, software programs were not protected by copyright law. This meant that anyone could copy and distribute software without permission or consequences.

However, as the use of computers and software became more prevalent, it became clear that protection for software was necessary. In 1980, the US government passed the Computer Software Copyright Act, which provided some limited protection for software. However, it was not until the early 1990s that the US government passed the Digital Millennium Copyright Act (DMCA), which provided more comprehensive protection for software and other digital works.

This act made it illegal to circumvent digital rights management (DRM) systems that protect copyrighted works, and also provided harsher penalties for copyright infringement. Overall, the implementation of copyright protection for software has been crucial in promoting innovation and protecting the rights of software developers and creators.

Learn more about copyright law: https://brainly.com/question/22089522

#SPJ11

Use the summary output obtained from Excel Regression function to answer the following questions. Regression Statistics R Square 0.017 Observations 35 Summary Output Coefficients Standard Error t Stat P-value Intercept 0.877 0.189 4.643 0 Predictor -0.144 0.19 1.(1 mark) Assuming that all assumptions are satisfied, calculate the ABSOLUTE value of the test statistic for testing the slope of the regression question (t-Stat) = (3dp) 2. (1 mark) Is the P-value less than 0.05 for testing the slope of the regression question? 3. (2 mark) Calculate a 95% confidence interval for the Predictor variable (Please double check and ensure that the lower bound is smaller than the upper bound) The lower bound = (3dp) The upper bound = (3dp)

Answers

The absolute value of the test statistic (t-Stat) for testing the slope of the regression equation is approximately 0.758.

What is the absolute value of the test statistic for testing the slope of the regression equation?

The absolute value of the test statistic (t-Stat) is a measure of how many standard errors the estimated slope coefficient is away from zero. In this case, the absolute value of the t-Stat is approximately 0.758.

To calculate the absolute value of the test statistic, we can refer to the summary output provided. The t-Stat for the predictor variable is given as 1. The absolute value of 1 is 1.

It is important to note that the absolute value of the test statistic is used when assessing the significance of the slope coefficient in the regression analysis.

By comparing the absolute value of the t-Stat to critical values from the t-distribution, we can determine whether the slope is statistically significant or not. In this case, we can conclude that the absolute value of the test statistic is 1.

Learn more about absolute value

brainly.com/question/31140452

#SPJ11


In which situation is the person applying critical thinking skills?

Answers

The  examples of situations  which a person can applying critical thinking skills are :

Evaluating sourcesProblem-solvingDecision-making

What is critical thinking skills?

In terms of  Evaluating sources, if a person is said to be researching a topic, they  need to look at the credibility as well as reliability of different forma of information that is been used.

Lastly, in terms of Problem-solving, if  a person is known to have issue, they can make use of critical thinking skills to be able to the root cause of the problem as well as make a well-stated solution.

Learn more about critical thinking from

https://brainly.com/question/25434379

#SPJ1

what kind of tag will give additional info about your webpage​

Answers

Answer:

The LINK tag

Explanation:

Answer:

The LINK tag

Instead of producing a clickable link, the <link> tag tells the browser that there is some additional information about this page located in a different file.

the testing of the in-place upgrade has led you to identify incompatibilities. what solution should you use to track the compatibility and what steps do you need to take to implement that solution?

Answers

In-place upgrade is a process in which the operating system is updated to a new version without losing any of the data present on the system. Sometimes the testing of in-place upgrade may lead to identification of incompatibilities. In such a situation, it becomes important to track the compatibility and take necessary steps to implement a solution.

To track compatibility, one should use a compatibility report. This report provides the status of the applications, devices, and drivers present in the system with respect to compatibility with the new operating system. To generate this report, follow the steps given below:

Open the command prompt as an administrator.

Type “cd %windir%\system32” and press enter.

Type “sdbinst -h” and press enter.

Type “sdbinst c:\Windows\AppPatch\custom.sdb” and press enter.

After the completion of the above steps, a compatibility report will be generated at “%windir%\AppCompat\Programs\Report.xml”.

After the generation of the report, the next step is to identify the incompatible drivers, applications, and devices. After the identification, one should remove the incompatible applications and devices and update the drivers. ConclusionIn conclusion, the solution to track compatibility is to use a compatibility report. This report provides the status of applications, devices, and drivers present in the system with respect to compatibility with the new operating system. The steps to implement the solution include the generation of a compatibility report, identification of incompatible drivers, applications, and devices, removal of incompatible applications and devices, and updating the drivers.

To learn more about In-place upgrade, visit:

https://brainly.com/question/31930022

#SPJ11

What is the most complex part of a PC?

Answers

Answer:

From a hardware standpoint, the CPU is most likely the main component. From a software standpoint, macOS and Windows are complex software systems.

Explanation:

choose the correct term to complete the sentence. a new class uses the properties and methods of an existing class is an example of polymorphism.

Answers

Inheritance is the correct term to complete the sentence. In object-oriented programming, inheritance is a mechanism that allows a new class (derived class) to inherit the properties and methods of an existing class (base class).

What term describes the mechanism in object-oriented programming where a new class inherits the properties and methods of an existing class?

The derived class can then extend or modify the inherited properties and methods or add new ones.

By utilizing inheritance, the derived class can reuse the code and functionality of the base class, promoting code reusability and modular design.

This allows for the creation of a hierarchical relationship between classes, where more specialized or specific classes inherit from more general or abstract classes.

In the given context, when a new class uses the properties and methods of an existing class, it implies that the new class is inheriting from the existing class.

The new class can then leverage and build upon the existing code, while also having the flexibility to customize or extend its behavior as needed.

Polymorphism, on the other hand, refers to the ability of objects of different classes to be treated as objects of a common superclass.

It allows different objects to respond to the same message or method call in different ways based on their specific implementations.

While polymorphism is an important concept in object-oriented programming, it is not directly related to the scenario described in the sentence.

Learn more about inheritance

brainly.com/question/29629066

#SPJ11

How to set encapsulation angular component.

Answers

Answer: anyone know?

Explanation:

which button is used to run the program in QBASIC

Answers

Answer:

S key

Explanation:

(Alternative) Hit the S key (or just hit Enter) to run the program. The menu shows shortcuts to do the same thing, Shift+F5 or just F5 alone. The program runs: Since the program was run once before, the first output (the first "Hello") remains on the screen.

Why does the use of passwords put the overall security of the network in jeopardy?

Answers

There is only so many amounts of passwords that can be used so they can repeat and people can learn they are the same and hack youuu

Which type of computer is used microprocessor​

Answers

Assuming you mean which type of computer uses a microprocessor the answer would be: A pc and/or microcomputer which use a single chip which is a microprocessor for their CPU (central processing unit)

if you need local information or up-to-date information on current events, you would have more success using which source? a. encyclopedias b. journals and online databases c. magazines d. newspapers and web sites

Answers

If you need local information or up-to-date information on current events, you would have more success using newspapers and web sites as they are more likely to provide timely and location-specific information. Encyclopedias, journals, and magazines are typically less focused on current events and may not provide the same level of up-to-date information.

the concept of the operating system allocating the processing unit among different processes creates an illusion, what are the shortfalls of this process? performance and control efficiency and judicious restricted and gaming user mode and kernel mode

Answers

The concept of the operating system allocating the processing unit among different processes creates an illusion that each process has exclusive access to the CPU.

One major shortfall is that the allocation of CPU time among processes can lead to inefficient use of system resources, as some processes may be waiting for the CPU while other processes are idle or performing less important tasks. This can result in slow system performance and reduced productivity.Another shortcoming is that this allocation process can be difficult to control and manage, leading to unpredictable behavior and potential system crashes or failures. Additionally, the restricted user mode and kernel mode can limit the ability of users to control and customize the operating system, leading to frustration and reduced usability.

To know more about operating system visit:

https://brainly.com/question/28250266

#SPJ1

can a regular expression be used to determine if a c program is syntactically correct, even though the regular expression may be extremely complex? defend your answer.

Answers

A regular expression cannot be used to determine if a C program is syntactically correct, even if the regular expression is extremely complex. This is because regular expressions are a powerful tool for pattern matching and text manipulation, but they have limitations in handling nested structures, which are common in programming languages like C.

C programs have various syntactic constructs such as loops, conditional statements, and function calls that often involve nested structures, like braces {} and parentheses (). Regular expressions are not designed to handle these nested structures, as they work based on regular grammars, which are not capable of handling context-free grammars that are needed for parsing programming languages like C.

To determine if a C program is syntactically correct, you would need to use a parsing technique like top-down or bottom-up parsing, which employs context-free grammars to properly handle the nested structures and complex syntax rules of the language.

Learn more about C programs: https://brainly.com/question/29892943

#SPJ11

Other Questions
A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy is a(n) _____. what country's capital sinks every year Order the following decimals and percentages in ascendingorder71%, 0.719, 1.09, 79.1%, 43%(2) GOV-1.D: Explain how and why states in the Americas developed and changed over time pls help me due tin 1 hrs I'll give u brainliest answer If x+y=125 and xy=22, find the value of (x+y). *IF YOU ANSWER,I WILL CROWN YOU*What properties do electrical conductors have HELP ASAPP!!!! :((A. 225B.275 Fill in the blank with the Spanish word that best completes the following sentence.Las mujeres _____ bananas.ponencreencomprendenvenden Carissa has had trouble sleeping at night. She tries several things to get herself relaxed before bedtime. She has a nightlight turns thetelevision volume down low, and texts friends on her phone to relax herself. Which of the following things could she change to help herprepare for sleep?She could change the color of the nightlight.She could mute the television.She could turn off all electronics.She could play games on her phone. Define the term gender and state three un equal gender tendencies within relationships that may be reinforced by irresponsible portrayal of female characters by the media PLS HELLPPPP with a good and simplified explanationjust 7th grade. Adirondack Corporation will need $1.75 million 3 years from now to replace some equipment. Currently, the firm has some extra cash and would like to establish a savings account for this purpose. The account pays 2.75 percent interest, compounded annually. How much money must the company deposit today to fully fund the equipment purchase?$1,412,308.18$1,613,216.131,798,407.21$1,876,306.49$1,350,868.47 To remember how to spell arithmetic, remember this crazy sentence: A rat in the house might eat the ice cream.Try to make up a crazy sentence to help you remember how to spell the following words: mathematics, trigonometry, algebra, geometry. Which is the equation of a line that is perpendicular to the line represented by. Y=3/4 X+ -1/2 What value of x is in the solution set of 3(x 4) > 5x + 2?EO0-1005A5 Brian goes to school 6 hours per day, and sleeps for 9 hours per day. What is the ratio of hours Brian works to hours Brian sleeps? Level 3: Large numbersExtend the program so that it will work efficiently for valuesup to at least 1,000,000. For example, quitegood 1000000 1 shouldprint 2 4 6 8 16 28 32 64 128 256 496 512 1024 2 1.PART A: Which statement best expresses the central idea of the text?AThe types of food people eat and the way that it is produced has varying costs for the environment, ranging from releasing pollution to wasting resources.BPeople tend to buy food that is a low cost to themselves, however, this type of food is usually produced in a way that is costly to the environment.CThe only way to reduce the emission of greenhouse gases is for the biggest meat eaters to convert to vegetarian or vegan diets.DPeople dont have to change what they eat to help the environment, just how their food is farmed or raised. Sebastian said that if a number is a perfect square. then the number is even. Provide two examples that show that the statement is false. an adverse opinion is issued when the auditor believes question content area bottom part 1 a. some parts of the financial statements are materially misstated or misleading. b. the overall financial statements are so materially misstated that they do not present fairly the financial position or results of operations and cash flows in conformity with gaap. c. the auditor is not independent. d. the financial statements would be found to be materially misstated if an investigation were performed.