Computer Networking If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use? access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use? 255.255.255.192 255.255.255.248 255.255.255.240 255.255.255.224 255.255.255.192 255.255.255.248 255.255.255.240 255.255.255.224 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which layer of OSI determines the interface of the system with the user? Data-link None of these Session Application Network Data-link None of these Session Application Network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking HOSTS file entries are limited to how many characters? None of these Unlimited 500 255 8 None of these Unlimited 500 255 8 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called? Electronic mail None of these Global network Paperless office Electronic newspaper Electronic mail None of these Global network Paperless office Electronic newspaper ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statements are true regarding ICMP packets?1. They acknowledge receipt of a TCP segment.2. They guarantee datagram delivery.3. They can provide hosts with information about network problems.4. They are encapsulated within IP datagrams. 2 and 3 3 and 4 1 only 2, 3 and 4 2 and 3 3 and 4 1 only 2, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP