The Linux administrator applied the following rule set to a Linux server: iptables -A INPUT -i eth1 -s 192.168.0.0/24 -j DROP iptables -A INPUT -i eth1 -s 10.0.0.0/8 -j DROP What does this rule set do?

A. blocks all incoming traffic sourced from either the 192.168.0.0/24 network or from the 10.0.0.0/8 network
B. blocks all incoming traffic destined for either the 192.168.0.0/24 network or for the 10.0.0.0/8 network
C. blocks all outgoing traffic sourced from either the 192.168.0.0/24 network or from the 10.0.0.0/8 network
D. blocks all outgoing traffic destined for either the 192.168.0.0/24 network or for the 10.0.0.0/8 network

A
Explanation: The rule sets specify that they apply to INPUT traffic (incoming), on the Ethernet 1 interface , sources from 192.168.0.0/24 or 10.0.0.0/8 ( that's the –s) and the action taken will be to DROP the packets.

Computer Science & Information Technology

You might also like to view...

Which of the following statements about customizing Ribbon tabs is false?

A) You can change the order of the tabs. B) You can change the order of the groups on the tabs. C) You can add groups to the tabs. D) You can change the background color of the tabs.

Computer Science & Information Technology

You are implementing a URL whitelisting system for a company that wants to restrict outbound HTTP'S connections to specific domains from their EC2-hosted applications you deploy a single EC2 instance running proxy software and configure It to accept traffic from all subnets and EC2 instances in the VPC. You configure the proxy to only pass through traffic to domains that you define in its whitelist configuration You have a nightly maintenance window or 10 minutes where ail instances fetch new software updates. Each update Is about 200MB In size and there are 500 instances In the VPC that routinely fetch updates. After a few days you notice that some machines are failing to successfully download some, but not all of their updates within the maintenance window. The download URLs used for

these updates are correctly listed in the proxy's whitelist configuration and you are able to access them manually using a web browser on the instances. What might be happening? (Choose two.) A. You are running the proxy on an undersized EC2 instance type so network throughput is not sufficient for all instances to download their updates in time. B. You are running the proxy on a sufficiently-sized EC2 instance in a private subnet and its network throughput is being throttled by a NAT running on an undersized EC2 instance. C. The route table for the subnets containing the affected EC2 instances is not configured to direct network traffic for the software update locations to the proxy. D. You have not allocated enough storage to the EC2 instance running the proxy so the network buffer is filling up, causing some requests to fail. E. You are running the proxy in a public subnet but have not allocated enough EIPs to support the needed network throughput through the Internet Gateway (IGW).

Computer Science & Information Technology