Computer Networking
Which of the following access lists will allow only HTTP traffic into network 196.15.7.0?

access-list 110 permit ip any 196.15.7.0 0.0.0.255
access-list 100 permit 196.15.7.0 0.0.0.255 eq www
access-list 10 deny tcp any 196.15.7.0 eq www
access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following series of commands will restrict Telnet access to the router?

Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#ip access-group 10 in
Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 out
Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line con 0Lab_A(config-line)#ip access-group 10 in
Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 in

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for encapsulation?

a technique used in best-effort delivery systems to avoid endlessly looping packets.
One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.
All of these
None of these

ANSWER DOWNLOAD EXAMIANS APP