There you have it! We looked at standard, extended, and named ACLs, as well as remarks, so you can better describe the what the ACL is really doing. We also discussed security concepts. One thing that you need to keep in mind for the certification or the real world is that totally secure networks do not exist; it comes down to how determined an individual is to hack your network. Security is based on layers of different types of obstacles, such as ACLs, firewall policies, AD policies, intrusion-detection systems, and network intrusion-prevention systems. For the certification, if you know your ACLs, you'll be fine, but for the real world, be prepared to learn a whole lot more.
See you in the next chapter.