A network administrator needs to prevent traffic from network 10.0.0.0/8 from reaching network 192.168.1.0/24 while allowing all other traffic. Which configuration method should the administrator use to achieve this?
Implement a standard ACL applied close to the source network.
Implement an extended ACL applied close to the source network.
Implement a standard ACL applied near the destination network.
Implement a time-based ACL applied on any interface.
To block traffic from a specific source network to a specific destination network, an extended access control list (ACL) should be used because it can filter traffic based on both source and destination IP addresses. Applying the extended ACL close to the source network prevents unwanted traffic from traversing the network, conserving bandwidth and resources. Standard ACLs filter only on source IP addresses and cannot specify destination addresses, making them unsuitable for this task. Time-based ACLs add time conditions but are unnecessary here since there is no time-based requirement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Access Control List (ACL) in networking?
Open an interactive chat with Bash
What is the difference between standard and extended ACLs?
Open an interactive chat with Bash
Why is it important to apply an ACL close to the source network?
Open an interactive chat with Bash
Cisco CCNA 200-301
Security Fundamentals
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access