Computer Networking
You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with?

access-list 10 deny 172.16.64.0 0.0.31.255
access-list 10 deny 172.16.136.0 0.0.15.255
access-list 10 deny 172.16.48.0 255.255.240.0
access-list 10 deny 172.16.144.0 0.0.7.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met?1. Each end of the trunk link must be set to the IEEE 802.1e encapsulation.2. The VTP management domain name of both switches must be set the same.3. All ports on both the switches must be set as access ports.4. One of the two switches must be configured as a VTP server.5. A rollover cable is required to connect the two switches together.6. A router must be used to forward VTP traffic between VLANs.

1 and 6
1, 2 and 4
3, 5 and 6
2 and 4

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The difference between a multiplexer and a statistical multiplexer is

Multiplexers often waste the output link capacity while statistical multiplexers optimize its use
Statistical multiplexers need buffers while multiplexers do not need buffers
Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol
Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM)
None of these

ANSWER DOWNLOAD EXAMIANS APP