Computer Networking
Which of the following is an example of a standard IP access list?

access-list 1 deny 172.16.10.1 0.0.0.0
access-list standard 1.1.1.1
access-list 110 permit host 1.1.1.1
access-list 1 permit 172.16.10.1 255.255.0.0

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following is true when describing a unicast address?

These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4.
These are like private addresses in IPv4 in that they are not meant to be routed.
These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.
Packets addressed to a unicast address are delivered to a single interface.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which statement describes a spanning-tree network that has converged?

All switch and bridge ports are in either the forwarding or blocking state.
All switch and bridge ports are assigned as either root or designated ports.
All switch and bridge ports are in the forwarding state.
All switch and bridge ports are either blocking or looping.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure

2 and 4
1 and 3
4 and 5
2, 3 and 5

ANSWER DOWNLOAD EXAMIANS APP