answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kobotan [32]
1 year ago
8

Access-lists pose a logical problem which often has more than one solution. Can you think of a different set of rules or placeme

nts that would yield the same required access filtering?
Computers and Technology
1 answer:
NARA [144]1 year ago
6 0

Answer:

Question is incomplete. it needs a topology diagram and also it needs Router R1 table. I assume User has access to the topology and Routing table.

Below Configuration will help to fix ACL problem

Hosts from the 172.16.0.0/16 network should have full access to Server1, Server2 and Server3 but this is not currently the case, as L1 can’t communicate to Server2 or Server3.

Explanation:

Following Configuration on Cisco Router R1 will help to fix all the ACL problems.

enable

configure terminal

no ip access-list standard FROM_10

ip access-list standard FROM_10

deny host 10.0.0.2

permit any

exit

!

no ip access-list standard FROM_172

ip access-list standard FROM_172

permit host 172.16.0.2

exit

!

interface GigabitEthernet0/0

ip access-group FROM_192 out

end

write memory

!

You might be interested in
Interactive media professionals are unique among other Information Technology professionals because they have very good job pros
Advocard [28]

Answer:

B.

Explanation:

Trust me.

3 0
2 years ago
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is a
klasskru [66]

Answer:

authentication

Explanation:

At the authentication process, there is a way of identifying a user, this is typically done by having the user enter a valid user name and valid password before access is granted. Here at authentication the process is based on each user having a unique set of criteria for gaining access.

The AAA server have to ascertain by comparing a user's authentication credentials with other user credentials stored in a database. In the event the credentials match, the user is granted access to the network. But on the other hand, If the credentials varies, and authentication fails then network access will be denied.

3 0
2 years ago
Define the instance method inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids. Sample output for th
kow [346]

Answer:

This is the instance method inc_num_kids()

def inc_num_kids(self):

       self.num_kids += 1

Explanation:

The first line is the definition of function inc_num_kids() which has a parameter self. self is basically an instance of  class PersonInfo

self.num_kids += 1 this statement incremented the data member num_kids by 1. This means that the instance method inc_num_kids, using instance self, increments the value of num_kids data member by 1.

The complete program is as following:

class PersonInfo:  #class name PersonInfo

   def __init__(self):   #constructor of the class

       self.num_kids = 0  # data member num_kids

   def inc_num_kids(self):  # method inc_num_kids

       self.num_kids += 1  #increments num_kids by 1

person1 = PersonInfo()  #creates object person of class PersonInfo

print('Kids:', person1.num_kids)  # prints num_kids value before increment

person1.inc_num_kids()  #calls inc_num_kids method to increment num_kids

print('New baby, kids now:', person1.num_kids) #prints the value of num_kids after increment by inc_num_kids method

The person1 object first access the initial value of num_kids initialized by the constructor. So the first value of num_kids is 0. self.num_kids = 0  This statement assigns the value 0 to num_kids data member. Next the method inc_num_kids() using the object person1. Now when this method is called the value of data member num_kids is incremented to 1.

So previously the value was 0 which now increments by 1 and becomes 1. Last print statement displays this new value which is incremented by the inc_num_kids() method.

Hence the output is:

Kids: 0

New baby, kids now: 1

The program along with its output is attached.

7 0
2 years ago
How can migrating to an enterprise platform solution help a business improve employee productivity?
Lorico [155]

Answer:

By allowing all employees to access and share the same stored dats and by increasing the number of wmployees in business activities

Explanation:

#<em>carry on learning</em>

5 0
2 years ago
1. Jesse wants a recommendation about creating an SCR help desk. She said that I can find lots of information about help desks o
OLEGan [10]

Answer:

The recommendations for Jesse about creating an SCR help desk are, the user interface, sending of data request to servers, sending data files back to the server, receiving  data files from the server, running an application programs locally to process data.

File server handles several jobs which includes, sending data files to client, storing of data files, and generating traffic on the internet.

The client/server tiers  allows user interface on the client and data can be stored on the server. it's elements includes the following: output, input, processes, performance, control and security

Explanation:

Given that:

(1)The recommendations is stated as follows:

A file sharing architecture is recommended where the clients can handle the following:

  • The user interface
  • Sends data request to servers
  • Sends data files back to the server
  • Receives data files from the server
  • Runs application programs locally to process data

The file server handles the following tasks or jobs which is stated below:

  • Receives data request from clients
  • Sends data files to client
  • Stores data files
  • Manage multi-user access
  • Generate LAN traffic

The Client design:

  • Lower  network traffic
  • Faster performance
  • Lower initial cost
  • Lower maintenance cost

The disadvantage of this, is that it is more difficult to design

Note: Kindly find an attached copy of part of the solution to this given question below

4 0
2 years ago
Other questions:
  • Which of these is an advantage of using the Clipboard task pane? A. You are able to apply OLE easily. B. There are more paste op
    15·2 answers
  • What is a partition gap, and how might it be used to hide data?â?
    8·2 answers
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    7·1 answer
  • Address the FIXME comments. Move the respective code from the while-loop to the created function. The add_grade function has alr
    14·1 answer
  • The following checksum formula is widely used by banks and credit card companies to validate legal account numbers: d0 + f(d1) +
    13·1 answer
  • Use the single-server drive-up bank teller operation referred to in Problems 1 and 2 to determine the following operating charac
    10·1 answer
  • Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea
    9·1 answer
  • Var name = prompt("Enter the name to print on your tee-shirt");
    7·1 answer
  • You would like the user of a program to enter a customer’s last name. Write a statement thaUse the variables k, d, and s so that
    5·1 answer
  • Which Artificial Intelligence (AI) term is used to describe extracting information from unstructured text using algorithms?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!