Extended IP access-lists (100-199) can be used to control
traffic.
Which command listed below will permit smtp mail to only
host 3.4.5.6 ?
A.) It is not possible for SMTP traffic
B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp
C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23
D.) access-list 102 permit tcp any any eq smtp
E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25
Answer Posted / guest
Answer: B E
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Explain how many tables are in ospf protocol?
How many hop counts are by default and how much you can increase in eigrp protocol?
What is the difference between csma/cd?
which points are eliminated by the DBSCAN algorithm?
What is protocol data unit in ccna?
hi friend i am sending some interview question which is asked from me at volvo hope this will help you of all 1 what is mpls al question is posted by jitendera kumar sinha
In stead of 0.0.0.0 wild card mask what you can write after ip?
Why mac address called physical address?
Explain the difference between routable and non- routable protocols?
On which base distance vector choose best path?
How are internetworks created?
How does RIP differ from IGRP?
Which mode we can't skip when we come back from interface mode?
What is difference between igp and eigrp?
What is the key advantage of using a switches?