Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking OSI model means: Open systems interconnection Operating source interconnection Open source interconnection Operating system interconnection Open systems interconnection Operating source interconnection Open source interconnection Operating system interconnection ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? X.25 SMTP VMTP None of these UDP X.25 SMTP VMTP None of these UDP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the maximum distance with maximum data rate for 802.11g? Over 200 feet About 150 feet About 90-100 feet About 65-75 feet Over 200 feet About 150 feet About 90-100 feet About 65-75 feet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? 224 192 248 252 240 224 192 248 252 240 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following allows a simple email service and is responsible for moving messages from one mail server to another? FTP SMTP IMAP DHCP POP3 FTP SMTP IMAP DHCP POP3 ANSWER DOWNLOAD EXAMIANS APP