What should be the first command to create an access-list that
prevents all users on subnetwork 10.10.128.0, using subnet mask
255.255.192.0, from being able to telnet anywhere?
A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq
telnet
B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq
telnet
C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any
eq telnet
D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq
telnet
E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq
telnet
F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq
telnet
6. Which device can create smaller networks and stop broadcast storms by default? A. Repeater B. Bridge C. Router D. Gateway
Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
what are layer hierarchy of cisco
Can you explain tunneling?
Tell me how many fillers we can put in one ip of ipv6?
Which reserve port number talent use?
In eigrp metric parameters which 2 options are enable by default?
Identify 3 IP applications? A.) AURP B.) ARP C.) Telnet D.) SMTP E.) DNS F.) RARP
Which addresses are valid host addresses? A. 201.222.5.17 B. 201.222.5.18 C. 201.222.5.16 D. 201.222.5.19 E. 201.222.5.31
What does the meaning of interface 0/0?
Explain the difference between flsm and vlsm?
Explain how an spf algorithm works?