Computer Networking You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router? (config-if)# ip access-group 110 in (config-if)# blocksales ip access-list in (config-if)# ip access-group Blocksales in (config)# ip access-group 110 in (config-if)# ip access-group 110 in (config-if)# blocksales ip access-list in (config-if)# ip access-group Blocksales in (config)# ip access-group 110 in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The difference between a multiplexer and a statistical multiplexer is Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol None of these Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol None of these Multiplexers often waste the output link capacity while statistical multiplexers optimize its use ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If the ASCII character H is sent and the character I is received, what type of error is this? multiple-bit recoverable burst single-bit multiple-bit recoverable burst single-bit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process. 1 and 4 1 and 3 2 and 3 3, 4 and 5 1 and 4 1 and 3 2 and 3 3, 4 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands will configure all the default VTY ports on a router? Router (config-if) #line console 0 Router (config) #line vty all Router (config) #line vty 0 4 Router#line vty 0 4 Router (config-if) #line console 0 Router (config) #line vty all Router (config) #line vty 0 4 Router#line vty 0 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The application layer of a network None of these establishes, maintains, and terminates virtual circuits defines the user's port into the network All of these consists of software being run on the computer connected to the network None of these establishes, maintains, and terminates virtual circuits defines the user's port into the network All of these consists of software being run on the computer connected to the network ANSWER DOWNLOAD EXAMIANS APP