Computer Networking Which of the following is an example of a standard IP access list? access-list 1 deny 172.16.10.1 0.0.0.0 access-list standard 1.1.1.1 access-list 110 permit host 1.1.1.1 access-list 1 permit 172.16.10.1 255.255.0.0 access-list 1 deny 172.16.10.1 0.0.0.0 access-list standard 1.1.1.1 access-list 110 permit host 1.1.1.1 access-list 1 permit 172.16.10.1 255.255.0.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following device is used to connect two systems, especially if the systems use different protocols? hub gateway bridge repeater None of these hub gateway bridge repeater None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a unicast address? These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals. If Delta modulation is selected, then how many bits per second are actually sent? 32 kbps 8 kbps None of these 128 kbps 64 kbps. 32 kbps 8 kbps None of these 128 kbps 64 kbps. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement describes a spanning-tree network that has converged? All switch and bridge ports are in either the forwarding or blocking state. All switch and bridge ports are assigned as either root or designated ports. All switch and bridge ports are in the forwarding state. All switch and bridge ports are either blocking or looping. All switch and bridge ports are in either the forwarding or blocking state. All switch and bridge ports are assigned as either root or designated ports. All switch and bridge ports are in the forwarding state. All switch and bridge ports are either blocking or looping. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2 and 4 1 and 3 4 and 5 2, 3 and 5 2 and 4 1 and 3 4 and 5 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP