Computer Networking The amount of uncertainty in a system of symbol is called None of these Bandwidth loss Entropy Quantum None of these Bandwidth loss Entropy Quantum ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with? access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.64.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The most important part of a multiple DHCP configurations is to make sure you don't have which of the following in the different scopes? Select the best answer. Duplicate subnets None of these Duplicate addresses Duplicate default gateways Duplicate pools Duplicate subnets None of these Duplicate addresses Duplicate default gateways Duplicate pools ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 1 only 3 and 4 1, 3 and 4 3 only 1 only 3 and 4 1, 3 and 4 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A communications device that combines transmissions from several I/O devices into one line is a: multiplexer modifier full-duplex line concentrator None of these multiplexer modifier full-duplex line concentrator None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 2 and 4 1 and 3 3 and 4 1 and 2 2 and 4 1 and 3 3 and 4 1 and 2 ANSWER DOWNLOAD EXAMIANS APP