Computer Networking
You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?

Computer Networking
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies
Ethernet, because it is cabled using fiber-optic cable
Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
Token-Ring, because it uses a MAU
Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?

access-list 10 deny 192.168.160.0 255.255.224.0
access-list 10 deny 192.168.160.0 0.0.191.255
access-list 10 deny 192.168.0.0 0.0.31.255
access-list 10 deny 192.168.160.0 0.0.31.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
In geosynchronous orbit, satellite

moves simultaneously
moves faster than the earth's rotation so that it can cover larger portion of earth.
remains in a fixed position so that as earth rotates, it can fully cover the earth
None of these
remains in a fixed position related to points on earth

ANSWER DOWNLOAD EXAMIANS APP