Computer Networking
You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?

255.255.255.224
255.255.255.192
255.255.255.240
255.255.255.248
255.255.255.252

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?

access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp
access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255
access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any
access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
RS-232-G

is an interface standard between Data terminal Equipment and Data Circuit Terminating Equipment
requires only 7 pin out of 25 in order to transmit digital data over public telephone lines
None of these
is an interface between two data circuit terminating equipment as examplified by a local and remote modem
specifies only the mechanical characteristics of an interface by providing a 25-pin connector

ANSWER DOWNLOAD EXAMIANS APP