Computer Networking Which encapsulations can be configured on a serial interface?1. Ethernet2. Token Ring3. HDLC4. Frame Relay5. PPP All of these 1 and 4 3, 4 and 5 2 only All of these 1 and 4 3, 4 and 5 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 12 hosts and a maximum number of subnets? 255.255.255.252 255.255.255.224 255.255.255.248 255.255.255. 240 255.255.255.192 255.255.255.252 255.255.255.224 255.255.255.248 255.255.255. 240 255.255.255.192 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a unique local address? These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. Packets addressed to a unicast address are delivered to a single interface. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. Packets addressed to a unicast address are delivered to a single interface. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.64.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN? When upper-layer protocols require high reliability In an improperly implemented redundant topology After broken links are reestablished During high-traffic periods When upper-layer protocols require high reliability In an improperly implemented redundant topology After broken links are reestablished During high-traffic periods ANSWER DOWNLOAD EXAMIANS APP