Computer Networking
If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?

access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23
access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet
access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23
access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following access lists will allow only HTTP traffic into network 196.15.7.0?

access-list 10 deny tcp any 196.15.7.0 eq www
access-list 110 permit ip any 196.15.7.0 0.0.0.255
access-list 100 permit 196.15.7.0 0.0.0.255 eq www
access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process.

2 and 3
3, 4 and 5
1 and 3
1 and 4

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Ethernet networks can be cabled in a number of topologies, depending on what works best in each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the best answer as to why Ethernet becomes less efficient as size increases.

Cable terminators do not reflect the signal properly
Network collisions occur
Repeaters cannot increase the signal strength sufficiently
"Line echo" occurs due to the impedance of the cable
Cable terminators do not absorb the signal properly

ANSWER DOWNLOAD EXAMIANS APP