Computer Networking
You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?

255.255.255.248
255.255.255.252
255.255.255.240
255.255.255.224
255.255.255.192

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You configure the following access list:access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtpaccess-list 110 deny tcp any eq 23int ethernet 0ip access-group 110 outWhat will the result of this access list be?

Everything but email and Telnet will be allowed out E0.
No IP traffic will be allowed out E0.
Email and Telnet will be allowed out E0.
Email and Telnet will be allowed in E0.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

Token-Ring, because it uses a MAU
Ethernet, because it is cabled using fiber-optic cable
Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology
Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies

ANSWER DOWNLOAD EXAMIANS APP