Computer Networking
ASK, PSK, FSK, and QAM are examples of _____ encoding.

digital-to-digital
None of these
analog-to-digital
digital-to-analog
analog-to-analog

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?

show access-lists
show interface Ethernet 0
show ip interface Ethernet 0
show ip access-lists

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with?

access-list 10 deny 172.16.64.0 0.0.31.255
access-list 10 deny 172.16.48.0 255.255.240.0
access-list 10 deny 172.16.144.0 0.0.7.255
access-list 10 deny 172.16.136.0 0.0.15.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The fundamental requirements of private-to-public network interconnection methods which need to be provided in gateways is/are

adequate cost control mechanisms for administration of the private networks
A and B both
None of these
to assign address to private network DTEs
universal accessibility for private network Data Terminal Equipment (DTE)

ANSWER DOWNLOAD EXAMIANS APP