Podcast
Questions and Answers
Network ACLs typically regulate access based on which of the following identifiers?
Network ACLs typically regulate access based on which of the following identifiers?
- Email addresses
- IP addresses and MAC addresses (correct)
- Usernames and passwords
- Website URLs
What type of permissions are commonly used in network ACLs?
What type of permissions are commonly used in network ACLs?
- Create and delete
- Execute and terminate
- Read and write
- Allow and deny (correct)
When setting up a network ACL, what do we use to dictate which traffic we are referring to?
When setting up a network ACL, what do we use to dictate which traffic we are referring to?
- Firewall rules
- Encryption keys
- Network protocols
- Identifiers (correct)
What is the purpose of network ACLs?
What is the purpose of network ACLs?