An administrator needs to block Telnet access from users to a specific server while allowing other network traffic. Which type of filtering method and its placement should be used to achieve this?
Using an extended access control list applied close to the source is the best approach. Extended access control lists can filter traffic based on source and destination IP addresses, protocols, and port numbers, which is necessary to block Telnet traffic (TCP port 23). Placing the extended list close to the source prevents unwanted Telnet traffic from traversing the network, enhancing efficiency. Standard access control lists only filter based on source IP addresses and should be placed close to the destination, so they are not suitable for this scenario. Applying an extended list close to the destination is less efficient as it allows unnecessary traffic onto the network.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an extended access control list?
Open an interactive chat with Bash
Why is the placement of an access list important?
Open an interactive chat with Bash
What distinguishes a standard access list from an extended access list?
Open an interactive chat with Bash
Cisco CCNA 200-301
Security Fundamentals
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access