Computer Networking
You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?

access-list 10 deny 172.16.64.0 0.0.31.255
access-list 10 deny 172.16.0.0 0.0.255.255
access-list 10 deny 172.16.48.0 0.0.15.255
access-list 10 deny 172.16.48.0 255.255.240.0

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router?

(config)# ip access-group 110 in
(config-if)# ip access-group 110 in
(config-if)# blocksales ip access-list in
(config-if)# ip access-group Blocksales in

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for Time-To-Line (TTL)?

All of these
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
a technique used in best-effort delivery system to avoid endlessly looping packets.
One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.
None of these

ANSWER DOWNLOAD EXAMIANS APP