Which statement about when standard access control lists are applied to an interface to
control inbound or outbound traffic is true?
A.
The best match of the ACL entries is used for granularity of control.
B.
They use source IP information for matching operations.
C.
They use source and destination IP information for matching operations.
D.
They use source IP information along with protocol-type information for finer granularity of
control.
Explanation:
Reference:
http://www.cs.odu.edu/~csi/cisco/router_configuration/access_list.html (see create standard
access lists)