Computer Networking Which of the following commands connect access list 110 inbound to interface ethernet0? Router(config)# ip access-group 110 in Router(config-if)# ip access-group 110 in Router(config)# ip access-list 110 in Router(config-if)# ip access-list 110 in Router(config)# ip access-group 110 in Router(config-if)# ip access-group 110 in Router(config)# ip access-list 110 in Router(config-if)# ip access-list 110 in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A communication network which is used by large organizations over regional, national or global area is called WAN LAN None of these Intranet MAN WAN LAN None of these Intranet MAN ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following digits are known as the sub-address digits (for use by the user) of the Network User Address (NUA)? 08-Dec 01-Apr 05-Jul 13-14 None of these 08-Dec 01-Apr 05-Jul 13-14 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? 1. 172.16.30.55 0.0.0.255 2. 172.16.30.55 0.0.0.0 3. any 172.16.30.55 4. host 172.16.30.55 5. 0.0.0.0 172.16.30.55 6. ip any 172.16.30.55 3 and 5 1 and 4 2 and 4 1, 4 and 6 3 and 5 1 and 4 2 and 4 1, 4 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. You copied the wrong configuration into RAM. The copy did not override the shutdown command in running-config. You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. You copied the wrong configuration into RAM. The copy did not override the shutdown command in running-config. ANSWER DOWNLOAD EXAMIANS APP