Computer Networking You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router? (config-if)# ip access-group Blocksales in (config)# ip access-group 110 in (config-if)# blocksales ip access-list in (config-if)# ip access-group 110 in (config-if)# ip access-group Blocksales in (config)# ip access-group 110 in (config-if)# blocksales ip access-list in (config-if)# ip access-group 110 in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The network layer, in reference to the OSI model, provide the interface between the X.25 network and packet mode device the virtual circuit interface to packet-switched service All of these data link procedures that provide for the exchange of data via frames that can be sent and received None of these the interface between the X.25 network and packet mode device the virtual circuit interface to packet-switched service All of these data link procedures that provide for the exchange of data via frames that can be sent and received None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP address from a server? None of these RARP RDP X.25 RIP None of these RARP RDP X.25 RIP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have been contracted to install a windows NT network in an office that is located in a strip mall. The office is located next to the power plant of the building, so a UPS (uninterruptible power supply) has already been installed. What type of cable should you use for the network cabling? Choose the best answer. Fiber-optic TI STP PSTN UTP Fiber-optic TI STP PSTN UTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of Spanning Tree Protocol in a switched LAN? To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To create collision domains To prevent switching loops in networks with redundant switched paths To prevent routing loops in networks with redundant paths To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To create collision domains To prevent switching loops in networks with redundant switched paths To prevent routing loops in networks with redundant paths ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP