Computer Networking If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host? 172.16.96.0 172.16.112.0 172.16.0.0 172.16.255.0 172.16.96.0 172.16.112.0 172.16.0.0 172.16.255.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following access lists will allow only HTTP traffic into network 196.15.7.0? access-list 100 permit 196.15.7.0 0.0.0.255 eq www access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www access-list 10 deny tcp any 196.15.7.0 eq www access-list 110 permit ip any 196.15.7.0 0.0.0.255 access-list 100 permit 196.15.7.0 0.0.0.255 eq www access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www access-list 10 deny tcp any 196.15.7.0 eq www access-list 110 permit ip any 196.15.7.0 0.0.0.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the frequency range of the IEEE 802.11a standard? 5Gbps 5GHz 2.4Gbps 2.4GHz 5Gbps 5GHz 2.4Gbps 2.4GHz ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What information is displayed by the show hosts command?1. Temporary DNS entries2. The names of the routers created using the hostname command3. The IP addresses of workstations allowed to access the router4. Permanent name-to-address mappings created using the ip host command5. The length of time a host has been connected to the router via Telnet All of these 1, 2 and 3 3, 4, and 5 1 and 4 All of these 1, 2 and 3 3, 4, and 5 1 and 4 ANSWER DOWNLOAD EXAMIANS APP