Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A software that allows a personal computer to pretend it as a terminal is bulletin board modem None of these terminal emulation auto-dialing bulletin board modem None of these terminal emulation auto-dialing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which IP address class has few hosts per network? C A B None of these D C A B None of these D ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following communications lines is best suited to interactive processing applications? narrowband channels full-duplex lines mixed band channels None of these simplex lines narrowband channels full-duplex lines mixed band channels None of these simplex lines ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command displays RIP routing updates? show protocols show ip route debug ip route debug ip rip show protocols show ip route debug ip route debug ip rip ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as Error rate Checksum Cyclic redundancy check Error detecting code None of these Error rate Checksum Cyclic redundancy check Error detecting code None of these ANSWER DOWNLOAD EXAMIANS APP