Computer Networking If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use? access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If the ASCII character G is sent and the character D is received, what type of error is this? burst single-bit recoverable None of these multiple-bit burst single-bit recoverable None of these multiple-bit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Layer 2 switching provides which of the following?1. Hardware-based bridging (ASIC)2. Wire speed3. Low latency4. Low cost 1 and 3 2 and 4 1, 2 and 4 All of these 1 and 3 2 and 4 1, 2 and 4 All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many hosts are attached to each of the local area networks at your site? None of these 128 64 254 256 None of these 128 64 254 256 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the data transmission channels available for carrying data from one location to another? All of these Voiceband None of these Narrowband Broadband All of these Voiceband None of these Narrowband Broadband ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With an IP address starting at 200, you currently have 10 subnets. What subnet mask should you use to maximize the number of available hosts? 224 192 252 240 248 224 192 252 240 248 ANSWER DOWNLOAD EXAMIANS APP