Computer Networking Which command would you use to apply an access list to a router interface? access-group ip 101 in ip access-group 101 in ip access-list 101 out access-list ip 101 in access-group ip 101 in ip access-group 101 in ip access-list 101 out access-list ip 101 in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router? (config)# ip access-group 110 in (config-if)# ip access-group Blocksales in (config-if)# ip access-group 110 in (config-if)# blocksales ip access-list in (config)# ip access-group 110 in (config-if)# ip access-group Blocksales in (config-if)# ip access-group 110 in (config-if)# blocksales ip access-list in ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following summation operations is performed on the bits to check an error-detecting code? Coder-decoder Checksum Broadband and baseband refer to the different frequencies at which infrared operates then transmitting signals in certain conditions Attenuation Codec Coder-decoder Checksum Broadband and baseband refer to the different frequencies at which infrared operates then transmitting signals in certain conditions Attenuation Codec ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocol does PPP use to identify the Network layer protocol? NCP ISDN HDLC LCP NCP ISDN HDLC LCP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? Collision detection Token passing CSMA/CD Time sharing Switched repeaters Collision detection Token passing CSMA/CD Time sharing Switched repeaters ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the default subnet mask for a class C network? 127.0.0.1 255.255.0.0 255.255.255.0 None of these 255.0.0.0 127.0.0.1 255.255.0.0 255.255.255.0 None of these 255.0.0.0 ANSWER DOWNLOAD EXAMIANS APP