Computer Networking Which command would you use to apply an access list to a router interface? access-list ip 101 in access-group ip 101 in ip access-group 101 in ip access-list 101 out access-list ip 101 in access-group ip 101 in ip access-group 101 in ip access-list 101 out ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following device is used to connect two systems, especially if the systems use different protocols? gateway repeater None of these hub bridge gateway repeater None of these hub bridge ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.64.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To back up an IOS, what command will you use? copy ios tftp copy tftp flash backup IOS disk copy flash tftp copy ios tftp copy tftp flash backup IOS disk copy flash tftp ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use? 255.255.255.240 255.255.255.224 255.255.255.248 255.255.255.192 255.255.255.240 255.255.255.224 255.255.255.248 255.255.255.192 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Synchronous protocols None of these transmit characters one at a time allow faster transmission than asynchronous protocols do are more reliable are generally used by personal computers None of these transmit characters one at a time allow faster transmission than asynchronous protocols do are more reliable are generally used by personal computers ANSWER DOWNLOAD EXAMIANS APP