Computer Networking
A T-switch is used to

transmit characters one at a time
control how messages are passed between computers
None of these
rearrange the connections between computing equipment
echo every character that is received

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?

access-list 10 deny 192.168.0.0 0.0.31.255
access-list 10 deny 192.168.160.0 0.0.31.255
access-list 10 deny 192.168.160.0 255.255.224.0
access-list 10 deny 192.168.160.0 0.0.191.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?

show interface Ethernet 0
show access-lists
show ip access-lists
show ip interface Ethernet 0

ANSWER DOWNLOAD EXAMIANS APP