Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with? access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following allows a router to respond to an ARP request that is intended for a remote host? Gateway DP Inverse ARP (IARP) Reverse ARP (RARP) Proxy ARP Gateway DP Inverse ARP (IARP) Reverse ARP (RARP) Proxy ARP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main reason the OSI model was created? So different networks could communicate. So Cisco could use the model. So application developers can change only one layer's protocols at a time. To create a layered model larger than the DoD model. So different networks could communicate. So Cisco could use the model. So application developers can change only one layer's protocols at a time. To create a layered model larger than the DoD model. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called? Global network None of these Electronic newspaper Electronic mail Paperless office Global network None of these Electronic newspaper Electronic mail Paperless office ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which router command allows you to view the entire contents of all access lists? show access-lists show interface show ip interface show all access-lists show access-lists show interface show ip interface show all access-lists ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error? one bit or any odd number of bits inverted in a block of data during transmission two bits or any even number of bits inverted in a byte during transmission None of these two bits or any even number of bits inverted in a block during transmission one bit or any odd number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a block of data during transmission two bits or any even number of bits inverted in a byte during transmission None of these two bits or any even number of bits inverted in a block during transmission one bit or any odd number of bits inverted in a byte during transmission ANSWER DOWNLOAD EXAMIANS APP