Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.191.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In Cisco's Unified Wireless Solution, what is the split-MAC architecture? The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains. The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101? 159, 0x9F 155, 0x9B 157, 0x9D 185, 0xB9 159, 0x9F 155, 0x9B 157, 0x9D 185, 0xB9 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands will display the current IP addressing and the layer 1 and 2 status of an interface?1. show version2. show protocols3. show interfaces4. show controllers5. show ip interface 3 and 4 only None of these 2, 3 and 5 1, 2 and 4 3 and 4 only None of these 2, 3 and 5 1, 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A distributed data processing configuration in which all activities must pass through a centrally located computer is called a: spider network data control network None of these ring network hierarchical network spider network data control network None of these ring network hierarchical network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? Network Access Application Internet Host-to-Host Network Access Application Internet Host-to-Host ANSWER DOWNLOAD EXAMIANS APP