A.reflexive B.extended C.standard D.dynamic
A.Administratively shut down the interface. B.Physically secure the interface. C.Create an access list and apply it to the virtual terminal interfaces with the access-group command. D.Configure a virtual terminal password and login process. E.Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
A.they offer simpler management in large internetworks. B.you can control logging messages. C.they allow packets to be filtered based on upper-layer session information. D.you can set a time-based security policy. E.they provide a level of security against spoofing. F.they are used to authenticate individual users.