Access-list 100 deny ip 223.8.151.0 0.0.0.255 any eq ftp Access-list 100 permit ip any any
D -
Access-list 100 deny tcp 210.93.105.0 0.0.0.255 223.8.151.0 0.0.0.255 eq ftp Access-list 100 permit ip any any
4-
Which network mask should you place on a class C address to accommodate a user requirement of two
sub networks with a maximum of 35 hosts on each network?
A -
255.255.255.192
B -
255.255.255.224
C -
255.255.255.240
D -
255.255.255.248
5-
What are two purposes of segmenting a network with a bridge?
A -
To reduce collisions.
B -
To add collision domains.
C -
To increase collisions.
D -
Both A & B
6-
What is an advantage of using a connectionless protocol such as UDP?
A -
Packet acknowledgement may reduce overhead traffic.
B -
Loss or duplication of data packets is less likely to occur.
C -
Packets are not acknowledged which reduces overhead traffic.
D -
The application relies on the transport layer for sequencing of the data packets.
7-
Which statement is true when a broadcast is sent in an Ethernet/802.3 LAN?
A -
The IP subnet used is 255.255.255.0
B -
The IP address used is 255.255.255.255
C -
The MAC address used is 00-00-00-00-00-00
D -
The MAC address used is FF-FF-FF-FF-FF-FF.
8-
What are two components of an IPX address?
A -
Network number; IP address.
B -
MAC address; node number.
C -
Network number; MAC address.
D -
Network number; subnet number.
9-
Which two statements about integrated services digital network (ISDN) are true?
A -
ISDN provides only data only capability.
B -
ISDN provides an integrated voice/data capability.
C -
The ISDN standards define the hardware and call setup schemes for end-to-end digital connectivity.
D -
Both B & C
10-
Which prompt and command combination sets RIP as the routing protocol?