Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Data communications system depends on four fundamental characteristics Sender Timeliness Medium Receiver Sender Timeliness Medium Receiver ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the first octet range for a class C IP address? 128 - 191 192 - 223 1 - 126 192 - 226 192 - 255 128 - 191 192 - 223 1 - 126 192 - 226 192 - 255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A required characteristic of an online real-time system is: more than one CPU All of these no delay in processing offline batch processing None of these more than one CPU All of these no delay in processing offline batch processing None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following uses ATM as the Data Link layer protocol that's terminated at what's known as the DSLAM? DSL Dedicated T1 Frame Relay Wireless PPPoE DSL Dedicated T1 Frame Relay Wireless PPPoE ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The X.25 standard specifies a technique for start-stop data None of these data bit rate technique for dial access DTE/DCE interface technique for start-stop data None of these data bit rate technique for dial access DTE/DCE interface ANSWER DOWNLOAD EXAMIANS APP