Computer Networking
You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with?

access-list 10 deny 172.16.0.0 0.0.255.255
access-list 10 deny 172.16.192.0 0.0.31.255
access-list 10 deny 172.16.188.0 0.0.15.255
access-list 10 deny 172.16.172.0 0.0.31.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following statements is correct for the use of packet switching?

All of these
the subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individ
the employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied
by employing wide bandwidth circuits for the trunk networks substantial economies through extensive sharing of capacity could be achieved.
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following refers to the terms "residual error rate"?

signal to noise ratio divided by the ratio of energy per bit to noise per hertz
The probability that one or more errors will be undetected when an error detection scheme is used
the number of bit errors per twenty four hours of continuous operation on an asynchronous line
the probability that one or more errors will be detected when an error detection mechanism is used
None of these

ANSWER DOWNLOAD EXAMIANS APP