Computer Networking
You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?

Computer Networking
You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?

access-list 10 deny 172.16.48.0 0.0.15.255
access-list 10 deny 172.16.48.0 255.255.240.0
access-list 10 deny 172.16.0.0 0.0.255.255
access-list 10 deny 172.16.64.0 0.0.31.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be?

You copied the configuration into flash memory instead.
You copied the wrong configuration into RAM.
The copy did not override the shutdown command in running-config.
The IOS became corrupted after the copy command was initiated.

ANSWER DOWNLOAD EXAMIANS APP