Computer Networking
You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with?

access-list 10 deny 172.16.48.0 255.255.240.0
access-list 10 deny 172.16.144.0 0.0.7.255
access-list 10 deny 172.16.64.0 0.0.31.255
access-list 10 deny 172.16.136.0 0.0.15.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for Time-To-Line (TTL)?

a technique used in best-effort delivery system to avoid endlessly looping packets.
One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
All of these
None of these

ANSWER DOWNLOAD EXAMIANS APP