Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which type of OSPF network will elect a backup designated router?1. Broadcast multi-access2. Non-broadcast multi-access3. Point-to-point4. Broadcast multipoint None of these 1 and 2 3 only 3 and 4 None of these 1 and 2 3 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Alex is required to provide information on how many people are using the network at any one time. Which network will enable him to do so? Star Ethernet Peer-to-peer Token-Ring Server-based Star Ethernet Peer-to-peer Token-Ring Server-based ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which application allows a user to access and change remote files without actual transfer? TELNET NFS DNS FTP None of these TELNET NFS DNS FTP None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which switching technology reduces the size of a broadcast domain? ISL STP VLANs 802.1Q ISL STP VLANs 802.1Q ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: Network Server Virtual Private Network Network operating system OSI Network Server Virtual Private Network Network operating system OSI ANSWER DOWNLOAD EXAMIANS APP