Computer Networking
You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with?

access-list 10 deny 172.16.48.0 255.255.240.0
access-list 10 deny 172.16.136.0 0.0.15.255
access-list 10 deny 172.16.144.0 0.0.7.255
access-list 10 deny 172.16.64.0 0.0.31.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The Corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. Looking at the output from the Corporate router, what will the router do with this packet?Corp#sh ip route[output cut]R 192.168.215.0 [120/2] via 192.168.20.2, 00:00:23, Serial0/0R 192.168.115.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0R 192.168.30.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0C 192.168.20.0 is directly connected, Serial0/0C 192.168.214.0 is directly connected, FastEthernet0/0

They will all load-balance.
The packet will be routed out the S0/0 interface.
The packet will be discarded.
The router will broadcast looking for the destination.
The packet will be routed out the Fa0/0 interface.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following is true regarding VTP?

All switches are VTP transparent by default.
All switches are VTP clients by default.
VTP is on by default with a domain name of Cisco on all Cisco switches.
All switches are VTP servers by default.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following summation operations is performed on the bits to check an error-detecting code?

Checksum
Attenuation
Broadband and baseband refer to the different frequencies at which infrared operates then transmitting signals in certain conditions
Coder-decoder
Codec

ANSWER DOWNLOAD EXAMIANS APP