Module 4: ACL Concepts Flashcards

1
Q

What do routers make routing decisions based on?

A

Information in the packet header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is traffic routed when entering a router interface?

A

Solely based on information within the routing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the router compare to find the best match for routing?

A

The destination IP address with routes in the routing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of an access control list (ACL)?

A

To filter packets based on information found in the packet header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

By default, do routers have any ACLs configured?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens when an ACL is applied to a router interface?

A

The router evaluates all network packets as they pass through the interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the role of access control entries (ACEs) in an ACL?

A

A sequential list of permit or deny statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fill in the blank: An ACL is a series of _______ commands used to filter packets.

A

lOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: A router forwards packets based on the best match route found in the routing table.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are ACEs commonly referred to as?

A

ACEs are also commonly called ACL statements.

ACL stands for Access Control List.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens when network traffic passes through an interface configured with an ACL?

A

The router compares the information within the packet against each ACE, in sequential order.

This is essential for determining if the packet matches one of the ACEs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the process called when a router checks packets against ACEs?

A

Packet filtering.

Packet filtering is crucial for managing network traffic and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do several tasks performed by routers require?

A

The use of ACLs to identify traffic.

ACLs help in controlling the flow of traffic based on defined rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of limiting in unnecessary network traffic?

A

To increase network performance

Reducing unnecessary traffic allows for better bandwidth management and improved application responsiveness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of high bandwidth traffic is often prohibited by a corporate policy to reduce network load?

A

Video traffic

Video traffic can consume significant bandwidth, impacting overall network performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can a policy to block video traffic be enforced?

A

Using ACLs (Access Control Lists)

ACLs can specify which types of traffic are allowed or denied on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is traffic flow control?

A

A corporate policy that requires routing protocol traffic to be limited to certain links only.

Traffic flow control helps manage network efficiency and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How can a corporate policy be implemented to control routing protocol traffic?

A

Using ACLs to restrict the delivery of routing updates to only those that come from a known source.

ACLs (Access Control Lists) are used to enhance network security by defining permissions for traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the basic level of security for network access?

A

Restricted access to authorized users only

This ensures that only individuals with permission can access sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does corporate policy demand regarding access to confidential networks?

A

Access must be restricted to authorized users only

This policy is crucial for protecting sensitive employee information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How can a policy be enforced to limit access to specified networks?

A

Using Access Control Lists (ACLs)

ACLs are used to define which users or systems are granted or denied access to specific resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does corporate policy require regarding network traffic?

A

Certain traffic, such as email, must be permitted while other traffic, like Telnet access, must be denied.

This reflects the need to control access and protect network integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How can a policy be implemented to filter traffic by type?

A

Using ACLs (Access Control Lists) to filter traffic.

ACLs are a set of rules that determine what traffic is allowed or denied on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False: All traffic types should be allowed into a network in order to not impact usability.

A

False

Some traffic must be denied, such as Telnet access because it’s not secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Fill in the blank: A policy can be implemented using _______ to filter traffic by type.

A

ACLs

ACLs help in managing network security by controlling traffic flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the purpose of a screen host?

A

To permit or deny access to network services

Screen hosts act as a gatekeeper for network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What must be considered when it comes to permitting or denying access to certain file types?

A

Access to some file types (e.g., FTP or HTTP) must be limited to user groups yet available to others.

This ensures that only authorised users can access sensitive or specific file types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How can a policy be implemented to control user access to services?

A

Using ACLs (Access Control Lists) to filter user access

ACLs are a common method for defining who can access what resources in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Fill in the blank: Corporate policy often requires that access to some file types be limited to _______.

A

Authorised user groups

This is aimed at protecting sensitive information from unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the purpose of providing priority to certain classes of network traffic?

A

To ensure that critical traffic, like voice traffic, is forwarded as fast as possible to avoid interruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How can a policy be implemented to prioritize voice traffic?

A

Using ACLs and QoS services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is packet filtering?

A

Packet filtering controls access to a network by analyzing incoming and/or outgoing packets and forwarding or discarding them based on given criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

At which OSI layers does packet filtering occur?

A

Packet filtering can occur at Layer 3 and Layer 4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Fill in the blank: Packet filtering controls access to a network by analyzing the incoming and/or outgoing packets and ______ them based on given criteria.

A

[forwarding or discarding]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What do standard ACLs filter?

A

Standard ACLs filter at Layer 3 using the source IPv4 address only.

Standard ACLs provide basic filtering capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What additional features do extended ACLs provide compared to standard ACLs?

A

Extended ACLs filter at Layer 3 using the source and/or destination IPv4 address and can also filter at Layer 4 using TCP, UDP ports, and optional protocol type information.

Extended ACLs allow for more granular control over network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What do ACLs define?

A

The set of rules that give added control for packets that enter inbound interfaces, relay through the router, and exit outbound interfaces of the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Can ACLs be configured for both inbound and outbound traffic?

A

Yes, ACLs can be configured to apply to both inbound traffic and outbound traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Do ACLs act on packets that originate from the router itself?

A

No, ACLs do not act on packets that originate from the router itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the purpose of an inbound ACL?

A

Filters packets before they are routed to the outbound interface

Inbound ACLs are efficient as they save routing lookup overhead if packets are discarded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How does an inbound ACL handle permitted packets?

A

Permitted packets are processed for routing

This allows the packet to proceed through the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

When are inbound ACLs most effectively used?

A

When the network attached to an inbound interface is the only source of packets that need to be examined

This ensures focused filtering of relevant traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the function of an outbound ACL?

A

Filters packets after they have been routed, regardless of the inbound interface

Outbound ACLs apply rules to traffic exiting the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

How are incoming packets processed in relation to outbound ACLs?

A

Incoming packets are routed to the outbound interface and then processed through the outbound ACL

This means outbound ACLs evaluate packets after routing decisions have been made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

When are outbound ACLs best utilized?

A

When the same filter will be applied to packets from multiple inbound interfaces before exiting the same outbound interface

This allows for centralized filtering of outgoing traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the first step when an ACL is applied to an interface?

A

The router extracts the source IPv4 address from the packet header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What does the router do after extracting the source IPv4 address?

A

The router starts at the top of the ACL and compares the source IPv4 address to each ACE in a sequential order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What happens when a match is made between the source IPv4 address and an ACE?

A

The router carries out the instruction, either permitting or denying the packet, and the remaining ACEs in the ACL are not analyzed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What occurs if the source IPv4 address does not match any ACEs in the ACL?

A

The packet is discarded due to an implicit deny ACE automatically applied to all ACLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What does ACE stand for in the context of ACL?

A

Access Control Entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is the last ACE statement of an ACL?

A

An implicit deny that blocks all traffic

This statement is automatically implied at the end of an ACL but is hidden and not displayed in the configuration.

52
Q

What happens if an ACL does not have any permit statements?

A

All traffic will be denied due to the implicit deny ACE statement

An ACL must have at least one permit statement to allow traffic.

53
Q

What are the permit or deny statements in an ACL called?

A

Access control entries

Access control entries (ACEs) are the individual rules that determine the permissions for accessing resources.

54
Q

Fill in the blank: Extended ACLs filter at _______.

A

Layer 3 and Layer 4

This allows for more granular control over network traffic.

55
Q

Fill in the blank: Standard ACLs filter at _______.

A

Layer 3

They are limited to filtering based on source addresses.

56
Q

Question

What does an IPv4 ACE use to determine which bits of the address to examine for a match?

A

Wildcard Mask

57
Q

How does a wildcard mask match bit values in an address?
Think about what binary value is a match, and which isn’t.

A

Wildcard mask bit 0 - Match the corresponding bit value in the address.
Wildcard mask bit 1 - Ignore the corresponding bit value in the address.

0.0.0.0 would match all octets. 0.0.255.255 would match the first two

58
Q

Question

What would the meaning be of the wildcard mask 0.0.0.15 ?

Think about what 15 is in binary, and whether a 1 or a 0 is a match

A

0.0.0.15 = All 0’s in the first three octets, and then 00001111 in the last octet.
* Match the first three octets
* Match the four left most bits of the last octet
* Ignore the last 4 bits of the last octet.

59
Q

What would the following IOS command achieve?

access-list 10 permit 192.168.1.1 0.0.0.0

A

It would create an ACE numbered 10, that allows traffic from 192.168.1.1 only.

access-list [ACL number] [permit/deny] [source] [wildcard]

60
Q

What would the following IOS command achieve?

access-list 10 permit 192.168.1.0 0.0.0.255

A

It would create an ACE numbered 10, that allows traffic from the entire 192.168.1.0/24 network.

61
Q

What would the following IOS command acheive?

access-list 10 permit 192.168.16.0 0.0.15.255

A

It would create an ACE numbered 10, that allows traffic from all the hosts in the 192.168.16.0/24 to the 192.168.31.0/24 networks.

Here’s what happens:
* The router checks the first two octets (192.168.) and sees they must match exactly.
* For the third octet, the router allows any value from 16 (00010000) to 31 (00011111), because the wildcard mask (15 or 00001111) allows variation in the last 4 bits.
* The fourth octet is entirely ignored (255 or 11111111), meaning it permits all host addresses within each subnet.

62
Q

Question

What is a shortcut for calculating a wildcard mask?

A

Subtract the subnet mask from 255.255.255.255

63
Q

Question

Assume you wanted an ACE in ACL 10 to permit all users in the 192.168.1.0/24 network.
How would you calculate the wildcard mask required?
What IOS command would you use to add it?

A
  1. Take the starting value of 255.255.255.255
  2. Subtract the subnet mask 255.255.255.0
  3. Resulting wildcard mask is 0.0.0.255
  4. IOS command access-list 10 permit 192.168.1.0 0.0.0.255
64
Q

Question

Assume you wanted an ACE in ACL 10 to permit all users in the 192.168.1.32/28 network.
How would you calculate the wildcard mask required?
What IOS command would you use to add it?

A
  1. Take the starting value of 255.255.255.255
  2. Calculate the subnet mask. A /28 network means 11110000 in the last octet, which is 128 + 64 + 32 + 16 = 240
  3. 255.255.255.255 - 255.255.255.240 = 0.0.0.15 wildcard mask.
  4. IOS command access-list 10 permit 192.168.1.32 0.0.0.15
65
Q

Question

Assume you wanted an ACE in ACL 10 to permit all users in the 192.168.10.0 and 192.168.11.0 networks.
How would you calculate the wildcard mask required?
What IOS command would you use to add it?

A
  1. Take the starting value of 255.255.255.255
  2. Calculate the subnet mask. 12.168.10.0 and 192.168.11.0 share the subnet mask of 255.255.254.0
  3. 255.255.255.255 - 255.255.254.0 = 0.0.1.255 wildcard mask.
  4. IOS command access-list 10 permit 192.168.10.0 0.0.1.255
66
Q

Question

Assume you wanted an ACE in ACL 10 to permit all users in the 192.168.16.0/24 to the 192.168.31.0/24 networks.
How would you calculate the wildcard mask required?
What IOS command would you use to add it?

A
  1. Calculate the wildcard mask, by noting the non-changing parts of the IP address with 0, the range of the partially variable octet by subtracting them (31-16 = 15), and then setting the variable octets to 255 = 0.0.15.255
  2. IOS command access-list 10 permit 192.168.16.0 0.0.15.255
67
Q

Question

What does the Wildcard Mask Keyword ‘host’ substitute for?
How would it be used to create an ACE?

A

Host substitutes for a wildcard mask of 0.0.0.0 meaning just the one host matches.
access-list 10 permit host 192.168.1.10 and access-list 10 permit 192.168.1.10 0.0.0.0 are functionaly identical.

68
Q

What does the Wildcard Mask Keyword ‘host’ substitute for?
How would it be used to create an ACE?

A

Any substitutes for a wildcard mask of 255.255.255.255 accepts every address.
access-list 10 permit any and access-list 10 permit 0.0.0.0 255.255.255.255 are functionaly identical.

69
Q

Question

Which wildcard mask would permit only host 10.10.10.1?

A

0.0.0.0

Or host substitute

70
Q

Question

Which wildcard mask would permit only hosts from the 10.10.0.0/16 network?

A

0.0.255.255

71
Q

Question

Which wildcard mask would permit all hosts?

A

255.255.255.255

Or any substitute

72
Q

Question

Which wildcard mask would permit all hosts from the 192.168.10.0/24 network?

A

0.0.0.255

73
Q

Question

How many ACLs can a router interface have?

A

Four.
1. Inbound IPv4 ACL
2. Outbound IPv4 ACL
3. Inbound IPv6 ACL
4. Outbound IPv6 ACL

Not all devices need both inbound and outbound ACLs

Remember this is per interface so a single router may have many more than four in total.

74
Q

Question

Why should great care be taken when adding or modifying ACLs?

A

Mistakes can be costly in terms of downtime, troubleshooting efforts, and poor network service.

75
Q

Describe the benefit of the ACL guideline

Basing ACLs on the organisational security policies

A

To ensure that security policies are being met.

76
Q

Describe the benefit of the ACL guideline

Write out in plain language what you want the ACL to do.

A

To help you ensure the ACL is going to do what you want and prevent inadvertently creating access problems.

77
Q

Describe the benefit of the ACL guideline

Use a text editor to create, edit, and save all of your ACLs in a single location.

A

For documentation purposes and to create a library of reusable ACLs.

78
Q

Describe the benefit of the ACL guideline

Document the ACLs using the remark command.

A

This will help you and others later understand the purpose of an ACE.

79
Q

Describe the benefit of the ACL guideline

Test the ACLs on a development network before implementing them on a production network.

A

To avoid costly errors in a live environment.

80
Q

Question

Look at the following ACL, is it a Standard or Extended ACL? Why?
access-list 10 permit 192.168.10.0 0.0.0.255
What would it achieve?

A

It is a standard ACL because it only permits/denies based on the source IPv4 address.
It would permit all hosts on the source network 192.168.10.0/24.

Because of the implied “deny any” ACE at the end of every ACL all other traffic would be blocked.

81
Q

Question

Look at the following ACL, is it a Standard or Extended ACL? Why?
access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq www
What would it acheive?

A

It is an extended ACL because it uses Layer 4 protocol information to permit/deny traffic.
It would permit all hosts on the 192.168.10.0/24 network to send traffic to any destination host on port 80 (www)

Because of the implied “deny any” ACE at the end of every ACL all other traffic would be blocked.

82
Q

Question

What ACL numbers are for standard ACLs?

A

1-99 and 1300-1999

83
Q

Question

What ACL numbers are used for extended ACLs?

A

100-19 and 2000-2699

84
Q

Question

Which is the preferred method, numbered ACLs or named ACLs?
Why?

A

Named ACLs because they are clearer in purpose

85
Q

Question

What IOS command is used to create a named ACL?

A

ip access-list [standard/extended] [acl-name]

e.g. ip access-list extended FTP-FILTER

86
Q

Question

What IOS command would be needed to create a named extended ACL called FTP-FILTER?

A

ip access-list extended FTP-FILTER

87
Q

Question

Once we have created a named extended ACL called FTP-FILTER what command would configure it to allow FTP traffic from any host in the 192.168.10.0/24 network to any destination?

A

permit tcp 192.168.10.0 0.0.0.255 any eq ftp

You can’t use the | pipe to allow multiple different traffic types like ftp|ftp-data

88
Q

Question

We have created a named ACL called FTP-FILTER and configured it to allow FTP traffic from any host in the 192.168.10.0/24 network to any destination.
How would we also allow FTP-DATA traffic?

A

Add another permit statement, with the traffic type set to ftp-data
permit tcp 192.168.10.0 0.0.0.255 any eq ftp-data

You can’t use the | pipe to allow multiple different traffic types like ftp|ftp-data

89
Q

Question

Where in the network should you place ACLs?

Think about more than just the device name

A
  • The router where it will have the greatest impact on efficiency.
  • Try to place ACLs to reduce unwanted traffic, by filtering it close to the source where possible, rather than allowing it to be sent through the network only to be denied near the destination.
90
Q

Question

Where should Extended ACLs typically be placed?

A

Extended ACLs tend to be configured close to the source

91
Q

Question

Where should Standard ACLs typically be placed?

A

Standard ACLs tend to be configured close to the destination

92
Q

Question

We want to create an ACL that blocks all traffic from 192.168.10.0/24 to 192.168.30.0/24.

Typically which interface should have this ACL configured?

A

As a standard ACL, it should be placed close to the destination.

In this case, preferably the router interface that connects only to the 192.168.30.0/24 network.

93
Q

Question

Which ACL is capable of filtering based on TCP port number?

A

Extended ACL

94
Q

True or False?

Numbered ACLs is the preferred method to use when configuring ACLs

A

False. Named ACLs are preferred.

95
Q

True or False?

Named ACLs can be standard or extended

A

True.

96
Q

What is the purpose of ACLs?

A

ACLs are used to identify traffic by filtering packets based on packet header information.

97
Q

What is an ACL?

A

A series of IOS commands used to filter packets.

98
Q

What does a router do if no ACLs are configured by default?

A

The router does not perform any packet filtering.

99
Q

What happens when an ACL is applied to an interface?

A

The router evaluates all network packets as they pass through the interface.

100
Q

What are permit or deny statements in an ACL called?

A

Access Control Entries (ACEs).

101
Q

What types of ACLs do Cisco routers support?

A

Standard ACLs and extended ACLs.

102
Q

What is the function of an inbound ACL?

A

Filters packets before they are routed to the outbound interface.

103
Q

What does an outbound ACL do?

A

Filters packets after they are routed, regardless of the inbound interface.

104
Q

What is the first step in the filtering process when an ACL is applied to an interface?

A

The router extracts the source IPv4 address from the packet header.

105
Q

How does a router process an ACL?

A

It compares the source IPv4 address to each ACE in sequential order.

106
Q

What happens if a match is made in an ACL?

A

The router either permits or denies the packet and does not analyze remaining ACEs.

107
Q

What occurs if the source IPv4 address does not match any ACEs?

A

The packet is discarded due to an implicit deny ACE.

108
Q

What is a wildcard mask?

A

A 32-bit mask used to determine which bits of an IPv4 address to examine for a match.

109
Q

How does a wildcard mask differ from a subnet mask?

A

It matches binary 1s and 0s differently; bit 0 matches, bit 1 ignores.

110
Q

What is the shortcut to calculate a wildcard mask?

A

Subtract the subnet mask from 255.255.255.255.

111
Q

What keywords simplify working with wildcard masks in Cisco IOS?

A

Keywords ‘host’ and ‘any’.

112
Q

Fill in the blank: A wildcard mask is used to filter traffic for _______.

A

[one host, one subnet, a range of IPv4 addresses]

113
Q

True or False: A wildcard mask can only be used for routing protocols.

A

False.

114
Q

What is the limit on the number of ACLs that can be applied on a dual-stacked router interface?

A

Up to four ACLs can be applied: one outbound IPv4 ACL, one inbound IPv4 ACL, one inbound IPv6 ACL, and one outbound IPv6 ACL.

115
Q

What basic planning is required before configuring an ACL?

A

The planning includes:
* Base ACLs on the organizational security policies
* Write out what you want the ACL to do
* Use a text editor to create, edit, and save all of your ACLs
* Document the ACLs using the remark command
* Test the ACLs on a development network before implementing them on a production network.

116
Q

What are the two types of IPv4 ACLs?

A

Standard ACLs and Extended ACLs.

117
Q

How do Standard ACLs determine whether to permit or deny packets?

A

Based only on the source IPv4 address.

118
Q

What additional criteria do Extended ACLs use to permit or deny packets?

A

Based on the source IPv4 address, destination IPv4 address, protocol type, source and destination TCP or UDP ports, and more.

119
Q

What is the range of ACL numbers for Standard ACLs?

A

1 to 99, or 1300 to 1999.

120
Q

What is the range of ACL numbers for Extended ACLs?

A

100 to 199, or 2000 to 2699.

121
Q

What is the preferred method for configuring ACLs?

A

Using named ACLs.

122
Q

What are the rules for naming ACLs?

A

The rules are:
* Assign a name to identify the purpose of the ACL
* Names can contain alphanumeric characters
* Names cannot contain spaces or punctuation
* Suggested to write the name in CAPITAL LETTERS
* Entries can be added or deleted within the ACL.

123
Q

Where should Extended ACLs be located for maximum efficiency?

A

As close as possible to the source of the traffic to be filtered.

124
Q

Where should Standard ACLs be located for maximum efficiency?

A

As close to the destination as possible.

125
Q

True or False: ACLs must be configured in both directions.

A

False.

126
Q

Fill in the blank: Every ACL should be placed where it has the greatest impact on _______.

A

[efficiency]

127
Q

What factors may influence the placement of an ACL?

A

The extent of organizational control, bandwidth of the networks, and ease of configuration.