Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement is true regarding classless routing protocols?1. The use of discontiguous networks is not allowed.2. The use of variable length subnet masks is permitted.3. RIPv1 is a classless routing protocol.4. IGRP supports classless routing within the same autonomous system.5. RIPv2 supports classless routing. 1, 3 and 5 3 and 4 2 and 5 None of these 1, 3 and 5 3 and 4 2 and 5 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 3 and 4 1 and 3 2, 3 and 5 2 and 5 3 and 4 1 and 3 2, 3 and 5 2 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals. Differential PCM with 4 bit relative signal value is used. Then how many bits per second are actually sent? None of these 128 Kbps. 64 Kbps 32 Kbps 8 Kbps None of these 128 Kbps. 64 Kbps 32 Kbps 8 Kbps ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How long is an IPv6 address? 64 bits 128 bits 32 bits 128 bytes 64 bits 128 bits 32 bits 128 bytes ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main reason the OSI model was created? So Cisco could use the model. So application developers can change only one layer's protocols at a time. So different networks could communicate. To create a layered model larger than the DoD model. So Cisco could use the model. So application developers can change only one layer's protocols at a time. So different networks could communicate. To create a layered model larger than the DoD model. ANSWER DOWNLOAD EXAMIANS APP