Computer Networking Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols? HDLC Cable xDSL IPSec VPN HDLC Cable xDSL IPSec VPN ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid? access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You type show running-config and get this output:[output cut]Line console 0 Exec-timeout 1 35 Password BIXPASSWD Login[output cut]What do the two numbers following the exec-timeout command mean? If no command has been typed in 35 seconds, the console connection will be closed. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed. If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out. If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed. If no command has been typed in 35 seconds, the console connection will be closed. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed. If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out. If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain? STP VTP DHCP ISL STP VTP DHCP ISL ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In a network with dozens of switches, how many root bridges would you have? 12 2 5 1 12 2 5 1 ANSWER DOWNLOAD EXAMIANS APP