Computer Networking
If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?

access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255
access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255
access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp
access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The physical layer, in reference to the OSI model, defines

the virtual circuit interface to packet-switched service
None of these
data link procedures that provide for the exchange of data via frames that can be sent and received
All of these
the interface between the X.25 network and packet mode device

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for fragment?

All of these
one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
None of these
a technique used in best-effort delivery systems to avoid endlessly looping packets
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame

ANSWER DOWNLOAD EXAMIANS APP