Computer Networking Which of the following best illustrates the default subnet mask for a class A,B, and C Network? 255.0.0.0, 255.255.0.0, 255.255.255.0 0.0.0.0, 0.0.0.1, 0.0.1.1 255.255.255.0, 255.255.0.0, 255.0.0.0 255.255.0.0, 255.255.255.0, 255.255.255.255 None of these 255.0.0.0, 255.255.0.0, 255.255.255.0 0.0.0.0, 0.0.0.1, 0.0.1.1 255.255.255.0, 255.255.0.0, 255.0.0.0 255.255.0.0, 255.255.255.0, 255.255.255.255 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command is used to determine if an IP access list is enabled on a particular interface? show access-lists show interface show ip interface show interface access-lists show access-lists show interface show ip interface show interface access-lists ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the administrative distance of OSPF? 110 120 100 90 110 120 100 90 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with? access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.136.0 0.0.15.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Networks where end user workstations are tied to LAN servers to share resources and application processing. Business applications of telecommunications Internetworked enterprise Information super highway Client/Server networks Business applications of telecommunications Internetworked enterprise Information super highway Client/Server networks ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A T-switch is used to echo every character that is received None of these rearrange the connections between computing equipment control how messages are passed between computers transmit characters one at a time echo every character that is received None of these rearrange the connections between computing equipment control how messages are passed between computers transmit characters one at a time ANSWER DOWNLOAD EXAMIANS APP