Computer Networking
You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router?

(config-if)# ip access-group 110 in
(config-if)# blocksales ip access-list in
(config-if)# ip access-group Blocksales in
(config)# ip access-group 110 in

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The difference between a multiplexer and a statistical multiplexer is

Statistical multiplexers need buffers while multiplexers do not need buffers
Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM)
Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol
None of these
Multiplexers often waste the output link capacity while statistical multiplexers optimize its use

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process.

1 and 4
1 and 3
2 and 3
3, 4 and 5

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The application layer of a network

None of these
establishes, maintains, and terminates virtual circuits
defines the user's port into the network
All of these
consists of software being run on the computer connected to the network

ANSWER DOWNLOAD EXAMIANS APP