Computer Networking Which of the following series of commands will restrict Telnet access to the router? Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line con 0Lab_A(config-line)#ip access-group 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 out Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#ip access-group 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line con 0Lab_A(config-line)#ip access-group 10 in Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 out Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#ip access-group 10 in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are true regarding OSPF areas?1. You must have separate loopback interfaces configured in each area.2. The numbers you can assign an area go up to 65,535.3. The backbone area is also called area 0.4. If your design is hierarchical, then you don't need multiple areas.5. All areas must connect to area 0. 3 and 4 only 1 only 3, 4 and 5 1 and 2 only 3 and 4 only 1 only 3, 4 and 5 1 and 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with? access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to determine whether IP information has been assigned to your Windows NT. Which utility should you use? NBTSTAT IPCONFIG PING NETSTAT WINIPCFG NBTSTAT IPCONFIG PING NETSTAT WINIPCFG ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 3 and 4 1 and 2 1 only 2 only 3 and 4 1 and 2 1 only 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following allows a router to respond to an ARP request that is intended for a remote host? Reverse ARP (RARP) Gateway DP Inverse ARP (IARP) Proxy ARP Reverse ARP (RARP) Gateway DP Inverse ARP (IARP) Proxy ARP ANSWER DOWNLOAD EXAMIANS APP