Computer Networking
You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?

show ip interface Ethernet 0
show interface Ethernet 0
show access-lists
show ip access-lists

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with?

access-list 10 deny 172.16.144.0 0.0.7.255
access-list 10 deny 172.16.48.0 255.255.240.0
access-list 10 deny 172.16.64.0 0.0.31.255
access-list 10 deny 172.16.136.0 0.0.15.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for fragment?

a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
All of these
a technique used in best-effort delivery systems to avoid endlessly looping packets
one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Demodulation is a process of

performing data description.
converting analog to digital signals
converting digital to analog signals
multiplexing various signals into one high speed line signals

ANSWER DOWNLOAD EXAMIANS APP