Which statement about when standard access control lists are applied to an interface to control inbound or outbound traffic is true?

Which statement about when standard access control lists are applied to an interface to control inbound or
outbound traffic is true?

Which statement about when standard access control lists are applied to an interface to control inbound or
outbound traffic is true?

A.
The best match to the ACL entries is used for granularity of control

B.
They use source IP information for matching operations

C.
They use source and destination IP information for matching operations

D.
They use source IP information along with protocol-type information for finer granularity of control



Leave a Reply 0

Your email address will not be published. Required fields are marked *