Tayshadeh5320 Tayshadeh5320
  • 29-08-2019
  • Computers and Technology
contestada

Which of the following logs would reveal activities related to an ACL?A. Mobile deviceB. TransactionC. FirewallD. Performance

Respuesta :

Numenius
Numenius Numenius
  • 02-09-2019

Answer: C) Firewall

Explanation:

Firewall logs reveal the activities which are related to an ACL( Access control list). Access control list define the route in the routing protocol and also control the quality of service and many different policies.

Firewall always need the access control list for implementation. ACL are simple in theory and widely used when it is organized and manage properly.

Answer Link

Otras preguntas

What is another term for the responding variable? primary variable dependent variable independent variable uncontrolled variable
What are the decorative arts? What is an example of a decorative art?
what are three complex fractions that simplify to 1/4?
108 divided by 6 distributive property
Find the quotient of 5/ 31 divided by 15/ 23. Reduce your answer to the lowest fraction. A. 93/23, or 41/23 B. 75/373 C. 115/465 D. 23/93 If you could pleas
ohio or ontario is in east or south
write the equation of the line that is parallel to the line whose equation is y = –4 and that passes through the point (1, 5). a. y=-5 b. y=-4 c. y=1 d. y=5
What are some of the characteristics of safe vs. "at risk" drivers
structures that no longer serve their original function are called _____ structures.
find the standard form of the equation of the parabola with a focus at (0, 6) and a directrix at y = -6.