Computer Networking
You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?

access-list 10 deny 192.168.0.0 0.0.31.255
access-list 10 deny 192.168.160.0 255.255.224.0
access-list 10 deny 192.168.160.0 0.0.31.255
access-list 10 deny 192.168.160.0 0.0.191.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Terminals are used to

provide information for the manager
collect data from the physical system
None of these
All of these
communicate management decisions to the physical system

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following refers to the terms "residual error rate"?

The probability that one or more errors will be undetected when an error detection scheme is used
the probability that one or more errors will be detected when an error detection mechanism is used
the number of bit errors per twenty four hours of continuous operation on an asynchronous line
None of these
signal to noise ratio divided by the ratio of energy per bit to noise per hertz

ANSWER DOWNLOAD EXAMIANS APP