A network administrator at a medium-sized enterprise is configuring an ACL on the main router to restrict access to a secure server hosting sensitive client data. The server is on the subnet 192.168.5.0/24. To ensure only devices from the administration team's subnet, 10.10.10.0/24, can access this server, which of the following ACL rules should be applied?
Permit 10.10.10.0 0.0.0.255 192.168.5.0 0.0.0.255
Permit 192.168.5.0 0.0.0.255 10.10.10.0 0.0.0.255
Permit 10.10.10.0 0.0.0.255 10.10.10.255 0.0.0.0
Permit 0.0.0.0 0.0.0.0 192.168.5.0 0.0.0.255