Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A teleprocessing system may consist of communications systems user systems All of these None of these computer center systems communications systems user systems All of these None of these computer center systems ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it is cabled using fiber-optic cable Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring, because it uses a MAU Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it is cabled using fiber-optic cable Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring, because it uses a MAU ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Terminals are used to communicate management decisions to the physical system collect data from the physical system All of these None of these provide information for the manager communicate management decisions to the physical system collect data from the physical system All of these None of these provide information for the manager ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which are considered the methods of NAT?1. Static2. IP NAT pool3. Dynamic4. NAT double-translation5. Overload All of these 3 only 1 and 6 1, 3 and 5 All of these 3 only 1 and 6 1, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as Gateways bridges None of these User Agent mail gateway Gateways bridges None of these User Agent mail gateway ANSWER DOWNLOAD EXAMIANS APP