Computer Networking
You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?

access-list 10 deny 192.168.160.0 0.0.191.255
access-list 10 deny 192.168.0.0 0.0.31.255
access-list 10 deny 192.168.160.0 0.0.31.255
access-list 10 deny 192.168.160.0 255.255.224.0

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which statement describes a spanning-tree network that has converged?

All switch and bridge ports are either blocking or looping.
All switch and bridge ports are in either the forwarding or blocking state.
All switch and bridge ports are assigned as either root or designated ports.
All switch and bridge ports are in the forwarding state.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies
Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
Ethernet, because it is cabled using fiber-optic cable
Token-Ring, because it uses a MAU
Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology

ANSWER DOWNLOAD EXAMIANS APP