Security1. Which of the following is true regarding access lists applied to an interface? A. You can place…