Computer Networking
You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with?

access-list 10 deny 172.16.136.0 0.0.15.255
access-list 10 deny 172.16.48.0 255.255.240.0
access-list 10 deny 172.16.64.0 0.0.31.255
access-list 10 deny 172.16.144.0 0.0.7.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process.

2 and 3
3, 4 and 5
1 and 4
1 and 3

ANSWER DOWNLOAD EXAMIANS APP