Computer Networking
Which of the following series of commands will restrict Telnet access to the router?

Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line con 0Lab_A(config-line)#ip access-group 10 in
Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 out
Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#ip access-group 10 in
Lab_A(config)#access-list 10 permit 172.16.1.1Lab_A(config)#line vty 0 4Lab_A(config-line)#access-class 10 in

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The difference between a multiplexer and a statistical multiplexer is

Statistical multiplexers need buffers while multiplexers do not need buffers
Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol
Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM)
None of these
Multiplexers often waste the output link capacity while statistical multiplexers optimize its use

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer

After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device
The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500
The network becomes more efficient
The network becomes less efficient
An additional token is added for every 1,000 nodes

ANSWER DOWNLOAD EXAMIANS APP