Computer Networking
You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?

access-list 10 deny 192.168.160.0 0.0.191.255
access-list 10 deny 192.168.160.0 255.255.224.0
access-list 10 deny 192.168.160.0 0.0.31.255
access-list 10 deny 192.168.0.0 0.0.31.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies
Ethernet, because it is cabled using fiber-optic cable
Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology
Token-Ring, because it uses a MAU

ANSWER DOWNLOAD EXAMIANS APP