1. Do you think you can secure a network with only ACLs?
2. Describe packet filtering and access control lists (ACLs).
3. Discuss a situation when you could have leveraged packet filtering technology and ACLs to secure your networking environment.
Please put number next to each answer