Computer Networking
You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?

access-list 10 deny 172.16.48.0 255.255.240.0
access-list 10 deny 172.16.0.0 0.0.255.255
access-list 10 deny 172.16.64.0 0.0.31.255
access-list 10 deny 172.16.48.0 0.0.15.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology
Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies
Ethernet, because it is cabled using fiber-optic cable
Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
Token-Ring, because it uses a MAU

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Terminals are used to

communicate management decisions to the physical system
collect data from the physical system
All of these
None of these
provide information for the manager

ANSWER DOWNLOAD EXAMIANS APP